Sciweavers

57 search results - page 11 / 12
» Invisible Genericity and 0
Sort
View
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
14 years 1 months ago
Exploring medical data using visual spaces with genetic programming and implicit functional mappings
Two medical data sets (Breast cancer and Colon cancer) are investigated within a visual data mining paradigm through the unsupervised construction of virtual reality spaces using ...
Julio J. Valdés, Robert Orchard, Alan J. Ba...
SIGECOM
2006
ACM
106views ECommerce» more  SIGECOM 2006»
14 years 1 months ago
Approximation algorithms and online mechanisms for item pricing
We present approximation and online algorithms for a number of problems of pricing items for sale so as to maximize seller’s revenue in an unlimited supply setting. Our first r...
Maria-Florina Balcan, Avrim Blum
WS
2003
ACM
14 years 17 days ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
OSDI
1996
ACM
13 years 8 months ago
Microkernels Meet Recursive Virtual Machines
This paper describes a novel approach to providingmodular and extensible operating system functionality and encapsulated environments based on a synthesis of microkernel and virtu...
Bryan Ford, Mike Hibler, Jay Lepreau, Patrick Tull...
NAS
2010
IEEE
13 years 5 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu