Sciweavers

1207 search results - page 154 / 242
» Towards optimal k-anonymization
Sort
View
MONET
2006
170views more  MONET 2006»
13 years 9 months ago
Decentralized Utility-based Sensor Network Design
Wireless sensor networks consist of energy-constrained sensor nodes operating unattended in highly dynamic environments. In this paper, we advocate a systematic decentralized appro...
Narayanan Sadagopan, Mitali Singh, Bhaskar Krishna...
APIN
2004
87views more  APIN 2004»
13 years 9 months ago
Supply Estimation Using Coevolutionary Genetic Algorithms in the Spanish Electrical Market
The price of electrical energy in Spain has not been regulated by the government since 1998, but determined by the supply from the generators in a competitive market, the so-called...
Enrique A. de la Cal Marín, Luciano S&aacut...
COMCOM
1998
78views more  COMCOM 1998»
13 years 9 months ago
The performance of SQL queries to an X.500 directory system
The X.500 standard speci es a distributed directory service designed to store information about people and objects associated with computer networks. Its API is geared toward retr...
David Barrowman, Patrick Martin
SIGOPS
2010
91views more  SIGOPS 2010»
13 years 8 months ago
FastAD: an authenticated directory for billions of objects
We develop techniques that make authenticated directories efficient and scalable toward the goal of managing tens of billions of objects in a single directory. Internet storage s...
Paul T. Stanton, Benjamin McKeown, Randal C. Burns...
VTC
2010
IEEE
135views Communications» more  VTC 2010»
13 years 7 months ago
Biconnecting a Network of Mobile Robots Using Virtual Angular Forces
This paper proposes a new solution to the problem of self-deploying a network of wireless mobile robots with simultaneous consideration to several criteria, that are, the fault-tol...
Arnaud Casteigts, Jeremie Albert, Serge Chaumette,...