Sciweavers

20197 search results - page 3766 / 4040
» Comparing Computational Power
Sort
View
DSN
2009
IEEE
15 years 8 months ago
Verme: Worm containment in overlay networks
Topological worms, such as those that propagate by following links in an overlay network, have the potential to spread faster than traditional random scanning worms because they h...
Filipe Freitas, Edgar Marques, Rodrigo Rodrigues, ...
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
15 years 7 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
ICPP
2009
IEEE
15 years 7 months ago
Run to Potential: Sweep Coverage in Wireless Sensor Networks
—Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how w...
Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu,...
IPPS
2009
IEEE
15 years 7 months ago
Network awareness of P2P live streaming applications
Abstract—Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about ...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
ATAL
2009
Springer
15 years 7 months ago
Adaptive price update in distributed Lagrangian relaxation protocol
Distributed Lagrangian Relaxation Protocol (DisLRP) has been proposed to solve a distributed combinatorial maximization problem called the Generalized Mutual Assignment Problem (G...
Katsutoshi Hirayama, Toshihiro Matsui, Makoto Yoko...
« Prev « First page 3766 / 4040 Last » Next »