Sciweavers

1049 search results - page 76 / 210
» Simulation of load balancing algorithms: a comparative study
Sort
View
AAIM
2007
Springer
145views Algorithms» more  AAIM 2007»
14 years 4 months ago
Improved Approximation Algorithms for Predicting RNA Secondary Structures with Arbitrary Pseudoknots
We study three closely related problems motivated by the prediction of RNA secondary structures with arbitrary pseudoknots: the MAXIMUM BASE PAIR STACKINGS problem proposed by Ieon...
Minghui Jiang
ICC
2007
IEEE
115views Communications» more  ICC 2007»
14 years 4 months ago
Distributed Minimum-Cost Clustering Protocol for UnderWater Sensor Networks (UWSNs)
—In this paper, we study the node clustering problem in UnderWater Sensor Networks (UWSNs). We formulate the problem into a cluster-centric cost-based optimization problem with a...
Pu Wang, Cheng Li, Jun Zheng
CN
2007
146views more  CN 2007»
13 years 10 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
NETWORKING
2010
13 years 11 months ago
Measurement Study of Multi-party Video Conferencing
Abstract. More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies ...
Yue Lu, Yong Zhao, Fernando A. Kuipers, Piet Van M...
PPOPP
2009
ACM
14 years 11 months ago
Idempotent work stealing
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a key component of many applications and parallelizing runtimes. Work-stealing is ...
Maged M. Michael, Martin T. Vechev, Vijay A. Saras...