Sciweavers

4208 search results - page 185 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
USS
2010
14 years 11 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
PAM
2005
Springer
15 years 7 months ago
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
Abstract. While several algorithms have been created to actively measure the end-to-end available bandwidth of a network path, they require instrumentation at both ends of the path...
Marcia Zangrilli, Bruce Lowekamp
GECCO
2010
Springer
189views Optimization» more  GECCO 2010»
14 years 11 months ago
Multiobjective evolutionary algorithm for software project portfolio optimization
Large software companies have to plan their project portfolio to maximize potential portfolio return and strategic alignment, while balancing various preferences, and considering ...
Thomas Kremmel, Jirí Kubalík, Stefan...
ADHOCNOW
2011
Springer
14 years 5 months ago
Joint Duty Cycle Scheduling, Resource Allocation and Multi-constrained QoS Routing Algorithm
Wireless mesh sensor networks (WMSNs) have recently gained a lot of interest due to their communication capability to support various applications with different Quality of Service...
Jamila Ben Slimane, Yeqiong Song, Anis Koubaa, Mou...
117
Voted
CIDM
2009
IEEE
15 years 6 months ago
An architecture and algorithms for multi-run clustering
—This paper addresses two main challenges for clustering which require extensive human effort: selecting appropriate parameters for an arbitrary clustering algorithm and identify...
Rachsuda Jiamthapthaksin, Christoph F. Eick, Vadee...