Sciweavers

1791 search results - page 217 / 359
» Behavioral Operations
Sort
View
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 9 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
WS
2005
ACM
15 years 9 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
GECCO
2005
Springer
112views Optimization» more  GECCO 2005»
15 years 9 months ago
Monotonic solution concepts in coevolution
Assume a coevolutionary algorithm capable of storing and utilizing all phenotypes discovered during its operation, for as long as it operates on a problem; that is, assume an algo...
Sevan G. Ficici
WWIC
2005
Springer
197views Communications» more  WWIC 2005»
15 years 9 months ago
Reducing Memory Fragmentation with Performance-Optimized Dynamic Memory Allocators in Network Applications
The needs for run-time data storage in modern wired and wireless network applications are increasing. Additionally, the nature of these applications is very dynamic, resulting in ...
Stylianos Mamagkakis, Christos Baloukas, David Ati...
143
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Cooperation in Wireless Ad Hoc Networks
— In wireless ad hoc networks, nodes communicate with far off destinations using intermediate nodes as relays. Since wireless nodes are energy constrained, it may not be in the b...
Vikram Srinivasan, Pavan Nuggehalli, Carla-Fabiana...