Sciweavers

238 search results - page 18 / 48
» Efficient Methods for Selfish Network Design
Sort
View
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 11 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
INFOCOM
2005
IEEE
14 years 1 months ago
IPStash: a set-associative memory approach for efficient IP-lookup
—IP-Lookup is a challenging problem because of the increasing routing table sizes, increased traffic, and higher speed links. These characteristics lead to the prevalence of hard...
Stefanos Kaxiras, Georgios Keramidas
ISLPED
2003
ACM
115views Hardware» more  ISLPED 2003»
14 years 1 months ago
Reducing energy and delay using efficient victim caches
In this paper, we investigate methods for improving the hit rates in the first level of memory hierarchy. Particularly, we propose victim cache structures to reduce the number of ...
Gokhan Memik, Glenn Reinman, William H. Mangione-S...
APIN
2005
127views more  APIN 2005»
13 years 7 months ago
Evolutionary Radial Basis Functions for Credit Assessment
Credit analysts generally assess the risk of credit applications based on their previous experience. They frequently employ quantitative methods to this end. Among the methods used...
Estefane G. M. de Lacerda, André Carlos Pon...
GIS
2010
ACM
13 years 5 months ago
Efficient indexing structure for scalable processing of spatial alarms
Spatial Alarms are reminders for mobile users upon their arrival of certain spatial location of interest. Spatial alarm processing requires meeting two demanding objectives: high ...
Myungcheol Doo, Ling Liu, Nitya Narasimhan, Venu V...