Sciweavers

535 search results - page 54 / 107
» Do we need dependent types
Sort
View
FGCS
2008
140views more  FGCS 2008»
13 years 7 months ago
Allocation strategies for utilization of space-shared resources in Bag of Tasks grids
As the adoption of grid computing in organizations expands, the need for wise utilization of different types of resources also increases. A volatile resource, such as a desktop co...
César A. F. De Rose, Tiago C. Ferreto, Rodr...
ICMCS
2006
IEEE
102views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Novel Reverse Frame Selection Scheme for Video Streaming over VBR Channels
— In this paper, we propose a Reverse Frame Selection (RFS) scheme based on dynamic programming to solve for the problem of video streaming over VBR channels. In particular, we ï...
Dayong Tao, Jianfei Cai
ACSAC
2007
IEEE
14 years 2 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
IJCAI
2007
13 years 9 months ago
Sequential Bundle-Bid Single-Sale Auction Algorithms for Decentralized Control
We study auction-like algorithms for the distributed allocation of tasks to cooperating agents. To reduce the team cost of sequential single-item auction algorithms, we generalize...
Sven Koenig, Craig A. Tovey, Xiaoming Zheng, Ilgaz...
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 2 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao