Sciweavers

305 search results - page 34 / 61
» Boosting Set Constraint Propagation for Network Design
Sort
View
JEC
2006
73views more  JEC 2006»
13 years 7 months ago
Frame packing algorithms for automotive applications
The set of frames exchanged in automotive applications must meet two constraints: it has to be feasible from a schedulability point of view and it should minimize the network bandw...
Rishi Saket, Nicolas Navet
DESRIST
2009
Springer
109views Education» more  DESRIST 2009»
14 years 8 days ago
The constitutive and the instrumental in social design
Simon’s The Sciences of the Artificial is rightly influential as a founding text in design research in the information systems field (IS). Simon’s contributions in the same vo...
Murali Venkatesh
SIGCOMM
2010
ACM
13 years 7 months ago
Rethinking iBGP routing
The Internet is organized as a collection of administrative domains, known as Autonomous Systems (ASes). These ASes interact through the Border Gateway Protocol (BGP) that allows ...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
INFOCOM
2002
IEEE
14 years 17 days ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
KDD
2003
ACM
269views Data Mining» more  KDD 2003»
14 years 8 months ago
Maximizing the spread of influence through a social network
Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technolog...
David Kempe, Jon M. Kleinberg, Éva Tardos