Sciweavers

10792 search results - page 2089 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
GECCO
2004
Springer
140views Optimization» more  GECCO 2004»
14 years 3 months ago
Keeping the Diversity with Small Populations Using Logic-Based Genetic Programming
We present a new method of Logic-Based Genetic Programming (LBGP). Using the intrinsic mechanism of backtracking in Prolog, we utilize large individual programs with redundant clau...
Ken Taniguchi, Takao Terano
GI
2004
Springer
14 years 3 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
14 years 3 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
ISAAC
2004
Springer
84views Algorithms» more  ISAAC 2004»
14 years 3 months ago
Property-Preserving Data Reconstruction
We initiate a new line of investigation into online property-preserving data reconstruction. Consider a dataset which is assumed to satisfy various (known) structural properties; e...
Nir Ailon, Bernard Chazelle, Seshadhri Comandur, D...
MDM
2004
Springer
133views Communications» more  MDM 2004»
14 years 3 months ago
Cache-Miss-Initiated Prefetch in Mobile Environments
Prefetching has been widely used to improve system performance in mobile environments. Since prefetching consumes system resources, such as bandwidth and power, it is important to...
Hui Song, Guohong Cao
« Prev « First page 2089 / 2159 Last » Next »