Sciweavers

11488 search results - page 2213 / 2298
» Robust optimization - methodology and applications
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Why should we integrate services, servers, and networking in a data center?
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the netwo...
Paolo Costa, Thomas Zahn, Antony I. T. Rowstron, G...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 3 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SMA
2009
ACM
223views Solid Modeling» more  SMA 2009»
14 years 3 months ago
Particle-based forecast mechanism for continuous collision detection in deformable environments
Collision detection in geometrically complex scenes is crucial in physical simulations and real time applications. Works based on spatial hierarchical structures have been propose...
Thomas Jund, David Cazier, Jean-François Du...
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
14 years 3 months ago
Continuous-time behavioral portfolio selection
This paper formulates and studies a general continuous-time behavioral portfolio selection model under Kahneman and Tversky's (cumulative) prospect theory, featuring S-shaped...
Hanqing Jin, Xun Yu Zhou
CODES
2008
IEEE
14 years 3 months ago
Speculative DMA for architecturally visible storage in instruction set extensions
Instruction set extensions (ISEs) can accelerate embedded processor performance. Many algorithms for ISE generation have shown good potential; some of them have recently been expa...
Theo Kluter, Philip Brisk, Paolo Ienne, Edoardo Ch...
« Prev « First page 2213 / 2298 Last » Next »