Sciweavers

287 search results - page 43 / 58
» Networks of Excellence
Sort
View
EDBT
2008
ACM
95views Database» more  EDBT 2008»
14 years 10 months ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...
INFOCOM
2009
IEEE
14 years 4 months ago
RAPID: Shrinking the Congestion-Control Timescale
Abstract—TCP congestion-control is fairly inefficient in achieving high throughput in high-speed and dynamic-bandwidth environments. The main culprit is the slow bandwidth-searc...
Vishnu Vardhan Reddy Konda, Jasleen Kaur
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
14 years 4 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl
ICDCS
2008
IEEE
14 years 4 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
CCGRID
2007
IEEE
14 years 4 months ago
Study of Different Replica Placement and Maintenance Strategies in Data Grid
Data replication is an excellent technique to move and cache data close to users. By replication, data access performance can be improved dramatically. One of the challenges in da...
Rashedur M. Rahman, Ken Barker, Reda Alhajj