Sciweavers

8724 search results - page 1688 / 1745
» Search result diversification
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
SIGCOMM
2010
ACM
13 years 9 months ago
Topology-aware resource allocation for data-intensive workloads
This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the ho...
Gunho Lee, Niraj Tolia, Parthasarathy Ranganathan,...
SIGIR
2010
ACM
13 years 9 months ago
Visual summarization of web pages
Visual summarization is an attractive new scheme to summarize web pages, which can help achieve a more friendly user experience in search and re-finding tasks by allowing users qu...
Binxing Jiao, Linjun Yang, Jizheng Xu, Feng Wu
ECAI
2010
Springer
13 years 9 months ago
Optimal Task Migration in Service-Oriented Systems: Algorithms and Mechanisms
In service-oriented systems, such as grids and clouds, users are able to outsource complex computational tasks by procuring resources on demand from remote service providers. As th...
Sebastian Stein, Enrico Gerding, Nicholas R. Jenni...
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
13 years 9 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
« Prev « First page 1688 / 1745 Last » Next »