Sciweavers

4072 search results - page 436 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
15 years 5 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
ICANN
2001
Springer
15 years 9 months ago
Fast Curvature Matrix-Vector Products
The method of conjugate gradients provides a very effective way to optimize large, deterministic systems by gradient descent. In its standard form, however, it is not amenable to ...
Nicol N. Schraudolph
SDM
2012
SIAM
238views Data Mining» more  SDM 2012»
13 years 6 months ago
Evaluating Event Credibility on Twitter
Though Twitter acts as a realtime news source with people acting as sensors and sending event updates from all over the world, rumors spread via Twitter have been noted to cause c...
Manish Gupta, Peixiang Zhao, Jiawei Han
FAST
2003
15 years 5 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
NOSSDAV
2001
Springer
15 years 9 months ago
Analysis of educational media server workloads
This paper presents an extensive analysis of the client workloads for educational media servers at two major U.S. universities. The goals of the analysis include providing data fo...
Jussara M. Almeida, Jeffrey Krueger, Derek L. Eage...