Sciweavers

2169 search results - page 338 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
ICRA
2008
IEEE
136views Robotics» more  ICRA 2008»
15 years 11 months ago
Multi-agent probabilistic search in a sequential decision-theoretic framework
— Consider the task of searching a region for the presence or absence of a target using a team of multiple searchers. This paper formulates this search problem as a sequential pr...
Timothy H. Chung, Joel W. Burdick
LCN
2008
IEEE
15 years 11 months ago
DiCAP: Distributed Packet Capturing architecture for high-speed network links
— IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge ...
Cristian Morariu, Burkhard Stiller
143
Voted
ICDCS
2007
IEEE
15 years 11 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
IPPS
2006
IEEE
15 years 10 months ago
Instability in parallel job scheduling simulation: the role of workload flurries
The performance of computer systems depends, among other things, on the workload. This motivates the use of real workloads (as recorded in activity logs) to drive simulations of n...
Dan Tsafrir, Dror G. Feitelson
APLAS
2004
ACM
15 years 10 months ago
A Functional Language for Logarithmic Space
Abstract. More than being just a tool for expressing algorithms, a welldesigned programming language allows the user to express her ideas efficiently. The design choices however eï...
Peter Møller Neergaard