Sciweavers

1084 search results - page 165 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
PIMRC
2008
IEEE
14 years 3 months ago
Understanding the Performance of 802.11 Networks
Abstract—In this paper, we review the most important performance characteristics of the 802.11 DCF wireless networks, point out some false common knowledge, and report on recent ...
Andrzej Duda
USS
2008
13 years 11 months ago
On Auditing Elections When Precincts Have Different Sizes
We address the problem of auditing an election when precincts may have different sizes. Prior work in this field has emphasized the simpler case when all precincts have the same s...
Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest
ATAL
2009
Springer
14 years 3 months ago
Caching schemes for DCOP search algorithms
Distributed Constraint Optimization (DCOP) is useful for solving agent-coordination problems. Any-space DCOP search algorithms require only a small amount of memory but can be spe...
William Yeoh, Pradeep Varakantham, Sven Koenig
AINA
2009
IEEE
14 years 3 months ago
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Antonio Silva, Julien Huillery, Sergio M. Jesus
GECCO
2010
Springer
183views Optimization» more  GECCO 2010»
14 years 1 months ago
Neuroevolution of mobile ad hoc networks
This paper describes a study of the evolution of distributed behavior, specifically the control of agents in a mobile ad hoc network, using neuroevolution. In neuroevolution, a p...
David B. Knoester, Heather Goldsby, Philip K. McKi...