Sciweavers

5891 search results - page 1147 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
AI
2002
Springer
15 years 4 months ago
Using similarity criteria to make issue trade-offs in automated negotiations
Automated negotiation is a key form of interaction in systems that are composed of multiple autonomous agents. The aim of such interactions is to reach agreements through an itera...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...
CPHYSICS
2004
87views more  CPHYSICS 2004»
15 years 4 months ago
Vlasov simulations on an adaptive phase-space grid
We introduce here a new method for the numerical resolution of the Vlasov equation on a phase space grid using an adaptive semi-Lagrangian method. The adaptivity is obtained throu...
Michael Gutnic, Matthieu Haefele, I. Paun, Eric So...
TRIDENTCOM
2010
IEEE
15 years 2 months ago
Polymorphic Ubiquitous Network Testbed RUBIQ
In this paper we present RUBIQ, a polymorphic ubiquitous network testbed. RUBIQ works on StarBED, which is a network testbed consisting of hundreds of PCs connected to each other. ...
Junya Nakata, Razvan Beuran, Takashi Okada, Ken-ic...
TOMCCAP
2011
145views more  TOMCCAP 2011»
14 years 11 months ago
A framework for cross-layer optimization of video streaming in wireless networks
tion problem in two steps. First, we formulate an abstract optimization problem for video streaming in wireless networks in general. This formulation exposes the important interact...
Cheng-Hsin Hsu, Mohamed Hefeeda
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
14 years 8 months ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
« Prev « First page 1147 / 1179 Last » Next »