Sciweavers

166 search results - page 32 / 34
» Network Programming for the Rest of Us
Sort
View
STOC
2004
ACM
150views Algorithms» more  STOC 2004»
14 years 7 months ago
Typical properties of winners and losers in discrete optimization
We present a probabilistic analysis for a large class of combinatorial optimization problems containing, e.g., all binary optimization problems defined by linear constraints and a...
René Beier, Berthold Vöcking
AIS
2006
Springer
13 years 7 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
INFOCOM
2007
IEEE
14 years 1 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu
ICS
2007
Tsinghua U.
14 years 1 months ago
GridRod: a dynamic runtime scheduler for grid workflows
Grid Workflows are emerging as practical programming models for solving large e-scientific problems on the Grid. However, it is typically assumed that the workflow components eith...
Shahaan Ayyub, David Abramson
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 1 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...