Sciweavers

322 search results - page 55 / 65
» Least Expected Cost Query Optimization: What Can We Expect
Sort
View
IWCMC
2010
ACM
13 years 10 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha
JCP
2007
143views more  JCP 2007»
13 years 8 months ago
Alternatives for In-Service BER Estimation in All-Optical Networks: Towards Minimum Intrusion
— Combining the existing approaches for optical intelligence and the speed and capacity of light is undoubtedly the only viable strategy for building future-proof, highspeed netw...
Carolina Pinart
INFOCOM
2009
IEEE
14 years 3 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
PPPJ
2009
ACM
14 years 3 months ago
Lazy continuations for Java virtual machines
Continuations, or ’the rest of the computation’, are a concept that is most often used in the context of functional and dynamic programming languages. Implementations of such ...
Lukas Stadler, Christian Wimmer, Thomas Würth...
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
14 years 2 months ago
Discussion of parallel model of multi-objective genetic algorithms on heterogeneous computational resources
— In this paper, a parallel model of multi-objective genetic algorithm supposing a grid environment is discussed. In this proposed parallel model, we extended master-slave model ...
Tomoyuki Hiroyasu, Kengo Yoshii, Mitsunori Miki