Sciweavers

5210 search results - page 963 / 1042
» Exact geometric computation
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
FOCS
2007
IEEE
14 years 3 months ago
Approximation Algorithms for Partial-Information Based Stochastic Control with Markovian Rewards
We consider a variant of the classic multi-armed bandit problem (MAB), which we call FEEDBACK MAB, where the reward obtained by playing each of n independent arms varies according...
Sudipto Guha, Kamesh Munagala
ICPP
2007
IEEE
14 years 3 months ago
Improving Search Using a Fault-Tolerant Overlay in Unstructured P2P Systems
Gnutella overlays have evolved to use a two-tier topology. However, we observed that the new topology had only achieved modest improvements in search success rates. Also, the new ...
William Acosta, Surendar Chandra
IPPS
2007
IEEE
14 years 3 months ago
Performance Studies of a WebSphere Application, Trade, in Scale-out and Scale-up Environments
Scale-out approach, in contrast to scale-up approach (exploring increasing performance by utilizing more powerful shared-memory servers), refers to deployment of applications on a...
Hao Yu, José E. Moreira, Parijat Dube, I-Hs...
WIMOB
2007
IEEE
14 years 3 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius