Sciweavers

828 search results - page 92 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
IEEEPACT
2008
IEEE
15 years 9 months ago
Feature selection and policy optimization for distributed instruction placement using reinforcement learning
Communication overheads are one of the fundamental challenges in a multiprocessor system. As the number of processors on a chip increases, communication overheads and the distribu...
Katherine E. Coons, Behnam Robatmili, Matthew E. T...
131
Voted
DEBS
2007
ACM
15 years 7 months ago
Concepts and models for typing events for event-based systems
Event-based systems are increasingly gaining widespread attention for applications that require integration with loosely coupled and distributed systems for time-critical business...
Szabolcs Rozsnyai, Josef Schiefer, Alexander Schat...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 8 months ago
Towards Feasible Topology Formation Algorithms for Bluetooth-based WPANs
In this paper, we tackle the problem of topology formation in Bluetooth Wireless Personal Area Networks (BTWPANs). We first overview and extend a previously proposed centralized ...
Carla-Fabiana Chiasserini, Marco Ajmone Marsan, El...
VLDB
2005
ACM
83views Database» more  VLDB 2005»
15 years 8 months ago
Indexing Data-oriented Overlay Networks
The application of structured overlay networks to implement index structures for data-oriented applications such as peer-to-peer databases or peer-to-peer information retrieval, r...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth, R...
ISCA
2008
IEEE
101views Hardware» more  ISCA 2008»
15 years 3 months ago
Scalability in Analyzing the Availability of Large-Scale Networks using Multicast
The goal of this paper is to identify and discuss scalability issues for the measurement-based analysis of the availability in large-scale networks using IP multicast technology. ...
Falko Dressler