Sciweavers

1874 search results - page 345 / 375
» Network optimization for DHT-based applications
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design
Abstract—We study the joint power control and minimumframe-length scheduling problem in wireless networks, under the physical interference model and subject to consecutive transm...
Liqun Fu, Soung Chang Liew, Jianwei Huang
IPPS
2009
IEEE
14 years 3 months ago
Designing multi-leader-based Allgather algorithms for multi-core clusters
The increasing demand for computational cycles is being met by the use of multi-core processors. Having large number of cores per node necessitates multi-core aware designs to ext...
Krishna Chaitanya Kandalla, Hari Subramoni, Gopala...
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 3 months ago
Evolution of robust data distribution among digital organisms
This paper describes a study of the evolution of robust communication, specifically the distribution of data among individuals in a population, using digital evolution. In digita...
David B. Knoester, Andres J. Ramirez, Philip K. Mc...
TAMC
2009
Springer
14 years 3 months ago
A Simple Greedy Algorithm for the k-Disjoint Flow Problem
In classical network flow theory the choice of paths, on which flow is sent, is only restricted by arc capacities. This, however, is not realistic in most applications. Many prob...
Maren Martens
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 3 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...