Sciweavers

900 search results - page 138 / 180
» Design of a Robust Search Algorithm for P2P Networks
Sort
View
DCOSS
2009
Springer
14 years 2 months ago
Speed Dating Despite Jammers
Many wireless standards and protocols today, such as WLAN and Bluetooth, operate on similar frequency bands. While this permits an efficient usage of the limited medium capacity, ...
Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid...
DIALM
2007
ACM
178views Algorithms» more  DIALM 2007»
13 years 12 months ago
Near-Optimal Compression of Probabilistic Counting Sketches for Networking Applications
Sketches--data structures for probabilistic, duplicate insensitive counting--are central building blocks of a number of recently proposed network protocols, for example in the con...
Björn Scheuermann, Martin Mauve
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 6 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
14 years 2 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl
DSS
2008
186views more  DSS 2008»
13 years 8 months ago
A machine learning approach to web page filtering using content and structure analysis
As the Web continues to grow, it has become increasingly difficult to search for relevant information using traditional search engines. Topic-specific search engines provide an al...
Michael Chau, Hsinchun Chen