Sciweavers

170 search results - page 9 / 34
» A Simple Greedy Algorithm for the k-Disjoint Flow Problem
Sort
View

Lecture Notes
443views
15 years 5 months ago
Design and Analysis of Computer Algorithms
"This course will consist of a number of major sections. The first will be a short review of some preliminary material, including asymptotics, summations, and recurrences and ...
David M. Mount
INFOCOM
2007
IEEE
14 years 1 months ago
Landmark Selection and Greedy Landmark-Descent Routing for Sensor Networks
—We study the problem of landmark selection for landmark-based routing in a network of fixed wireless communication nodes. We present a distributed landmark selection algorithm ...
An Nguyen, Nikola Milosavljevic, Qing Fang, Jie Ga...
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 9 months ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
ICNP
2007
IEEE
14 years 1 months ago
A Simple Model for Analyzing P2P Streaming Protocols
— P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well u...
Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui
ICMCS
2007
IEEE
137views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Wireless Video Streaming with Collaborative Admission Control for Home Networks
Limited bandwidth and high packet loss pose a serious challenge for video streaming over wireless networks. Even when packet loss in the medium is not present, the fluctuating ava...
Monchai Lertsutthiwong, Thinh Nguyen, Alan Fern