Sciweavers

7315 search results - page 1257 / 1463
» Peer-to-Peer Information Search
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Opportunistic forwarding in workplaces
So far, the search for Opportunistic Network (ON) applications has focused on urban/rural scenarios where the combined use of mobility and the store-carry-and-forward paradigm hel...
Sabrina Gaito, Elena Pagani, Gian Paolo Rossi
CEC
2008
IEEE
14 years 2 months ago
A study on constrained MA using GA and SQP: Analytical vs. finite-difference gradients
— Many deterministic algorithms in the context of constrained optimization require the first-order derivatives, or the gradient vectors, of the objective and constraint function...
Stephanus Daniel Handoko, Chee Keong Kwoh, Yew-Soo...
CEC
2008
IEEE
14 years 2 months ago
Natural Evolution Strategies
— This paper presents Natural Evolution Strategies (NES), a novel algorithm for performing real-valued ‘black box’ function optimization: optimizing an unknown objective func...
Daan Wierstra, Tom Schaul, Jan Peters, Jürgen...
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
14 years 2 months ago
Rethinking the Digital Divide: Towards a Path of Digital Effectiveness
The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching fo...
Corlane Barclay, Evan W. Duggan
ICIW
2008
IEEE
14 years 2 months ago
Governed Content Distribution on DHT Based Networks
Abstract—Peer-to-Peer (P2P) systems are widely used for sharing digital items without structured metadata and in absence of any kind of digital rights management applied to the d...
Walter Allasia, Francesco Gallo, Marco Milanesio, ...
« Prev « First page 1257 / 1463 Last » Next »