Sciweavers

2720 search results - page 536 / 544
» Distributed Computation for Diffusion Problem in a P2P-Enhan...
Sort
View
INFOCOM
2000
IEEE
14 years 29 days ago
Energy Conserving Routing in Wireless Ad-hoc Networks
— An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor based, monitoring system. Information is generated in certain nodes and need...
Jae-Hwan Chang, Leandros Tassiulas
APPROX
2006
Springer
88views Algorithms» more  APPROX 2006»
14 years 9 days ago
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs
Motivated by applications in batch scheduling of jobs in manufacturing systems and distributed computing, we study two related problems. Given is a set of jobs {J1, . . . , Jn}, w...
Leah Epstein, Magnús M. Halldórsson,...
CCS
2008
ACM
13 years 10 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
GECCO
2008
Springer
145views Optimization» more  GECCO 2008»
13 years 9 months ago
Memory with memory: soft assignment in genetic programming
Based in part on observations about the incremental nature of most state changes in biological systems, we introduce the idea of Memory with Memory in Genetic Programming (GP), wh...
Nicholas Freitag McPhee, Riccardo Poli
BMCBI
2010
154views more  BMCBI 2010»
13 years 8 months ago
An eScience-Bayes strategy for analyzing omics data
Background: The omics fields promise to revolutionize our understanding of biology and biomedicine. However, their potential is compromised by the challenge to analyze the huge da...
Martin Eklund, Ola Spjuth, Jarl E. S. Wikberg