Sciweavers

430 search results - page 82 / 86
» Simulation from non-standard distributions using envelope me...
Sort
View
SIGMETRICS
2010
ACM
177views Hardware» more  SIGMETRICS 2010»
14 years 20 days ago
Managing the cost, energy consumption, and carbon footprint of internet services
The large amount of energy consumed by Internet services represents significant and fast-growing financial and environmental costs. Increasingly, services are exploring dynamic ...
Kien Le, Ozlem Bilgir, Ricardo Bianchini, Margaret...
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
14 years 20 days ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
CN
2008
85views more  CN 2008»
13 years 8 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
DATE
2007
IEEE
107views Hardware» more  DATE 2007»
14 years 2 months ago
Routing table minimization for irregular mesh NoCs
The majority of current Network on Chip (NoC) architectures employ mesh topology and use simple static routing, to reduce power and area. However, regular mesh topology is unreali...
Evgeny Bolotin, Israel Cidon, Ran Ginosar, Avinoam...
CCS
2006
ACM
13 years 11 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo