Sciweavers

1266 search results - page 229 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
WWW
2008
ACM
14 years 9 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...
GECCO
2008
Springer
186views Optimization» more  GECCO 2008»
13 years 9 months ago
A pareto following variation operator for fast-converging multiobjective evolutionary algorithms
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder, Michael Kirley, Ra...
FGCS
2008
109views more  FGCS 2008»
13 years 8 months ago
Gridification of collaborative audiovisual organizations through the MediaGrid framework
Abstract In this publication, we discuss a use case for employing Grid technology in a media production / distribution environment. This type of environment is faced with the chall...
Bruno Volckaert, Tim Wauters, Marc De Leenheer, Pi...
MOBISYS
2010
ACM
13 years 10 months ago
Growing an organic indoor location system
Most current methods for 802.11-based indoor localization depend on surveys conducted by experts or skilled technicians. Some recent systems have incorporated surveying by users. ...
Jun-geun Park, Ben Charrow, Dorothy Curtis, Jonath...
IEEEPACT
2007
IEEE
14 years 2 months ago
A Flexible Heterogeneous Multi-Core Architecture
Multi-core processors naturally exploit thread-level parallelism (TLP). However, extracting instruction-level parallelism (ILP) from individual applications or threads is still a ...
Miquel Pericàs, Adrián Cristal, Fran...