Sciweavers

10901 search results - page 2114 / 2181
» Approximations in Distributed Optimization
Sort
View
ISSTA
2009
ACM
15 years 9 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
126
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Why should we integrate services, servers, and networking in a data center?
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the netwo...
Paolo Costa, Thomas Zahn, Antony I. T. Rowstron, G...
CISS
2008
IEEE
15 years 9 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
145
Voted
ICAC
2008
IEEE
15 years 9 months ago
Utility-Based Reinforcement Learning for Reactive Grids
—Large scale production grids are an important case for autonomic computing. They follow a mutualization paradigm: decision-making (human or automatic) is distributed and largely...
Julien Perez, Cécile Germain-Renaud, Bal&aa...
123
Voted
ICC
2008
IEEE
136views Communications» more  ICC 2008»
15 years 9 months ago
A Game-Theoretic Framework for Interference Management through Cognitive Sensing
A game theoretic framework is developed in this paper to facilitate inter-cell interference management through cognitive sensing distributively performed by mobile stations (MSs)....
Yingda Chen, Koon Hoo Teo, Shalinee Kishore, Jinyu...
« Prev « First page 2114 / 2181 Last » Next »