Sciweavers

1566 search results - page 276 / 314
» Contification Using Dominators
Sort
View
IEEEAMS
2003
IEEE
15 years 3 months ago
Communication Pattern Based Node Selection for Shared Networks
Selection of the most suitable nodes on a network to execute a parallel application requires matching the network status to the application requirements. We propose and validate a...
Srikanth Goteti, Jaspal Subhlok
INFOCOM
2003
IEEE
15 years 3 months ago
Receiver-Driven Bandwidth Sharing for TCP
— Applications using TCP, such as web-browsers, ftp, and various P2P programs, dominate most of the Internet traffic today. In many cases the last-hop access links are bottlenec...
Puneet Mehra, Christophe De Vleeschouwer, Avideh Z...
PERCOM
2003
ACM
15 years 3 months ago
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks
We investigate the performance issues of destinationsequenced distance vector (DSDV) and ad-hoc on-demand distance vector (AODV) routing protocols for mobile ad hoc networks. Four...
Yi Lu, Weichao Wang, Yuhui Zhong, Bharat K. Bharga...
ELPUB
2003
ACM
15 years 3 months ago
Mobile Internet Services in Japan and Europe: Examining Industrial Organisation in Relation to Interactive Electronic Publishing
Based on our field and desk-research , this paper will discuss the current situation of mobile telephones in relation to electronic publishing—a convergence that remains yet to ...
Myriam Diocaretz, Richard Tee
GECCO
2003
Springer
283views Optimization» more  GECCO 2003»
15 years 2 months ago
A Game-Theoretic Memory Mechanism for Coevolution
One problem associated with coevolutionary algorithms is that of forgetting, where one or more previously acquired traits are lost only to be needed later. We introduce a new coevo...
Sevan G. Ficici, Jordan B. Pollack