Sciweavers

170 search results - page 9 / 34
» A Simple Greedy Algorithm for the k-Disjoint Flow Problem
Sort
View
261
Voted

Lecture Notes
443views
17 years 17 days ago
Design and Analysis of Computer Algorithms
"This course will consist of a number of major sections. The first will be a short review of some preliminary material, including asymptotics, summations, and recurrences and ...
David M. Mount
133
Voted
INFOCOM
2007
IEEE
15 years 9 months ago
Landmark Selection and Greedy Landmark-Descent Routing for Sensor Networks
—We study the problem of landmark selection for landmark-based routing in a network of fixed wireless communication nodes. We present a distributed landmark selection algorithm ...
An Nguyen, Nikola Milosavljevic, Qing Fang, Jie Ga...
189
Voted
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
16 years 4 months ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
126
Voted
ICNP
2007
IEEE
15 years 9 months ago
A Simple Model for Analyzing P2P Streaming Protocols
— P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well u...
Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui
142
Voted
ICMCS
2007
IEEE
137views Multimedia» more  ICMCS 2007»
15 years 9 months ago
Wireless Video Streaming with Collaborative Admission Control for Home Networks
Limited bandwidth and high packet loss pose a serious challenge for video streaming over wireless networks. Even when packet loss in the medium is not present, the fluctuating ava...
Monchai Lertsutthiwong, Thinh Nguyen, Alan Fern