Sciweavers

4072 search results - page 621 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 9 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
SIGCOMM
2005
ACM
15 years 8 months ago
Declarative routing: extensible routing with declarative queries
The Internet’s core routing infrastructure, while arguably robust and efficient, has proven to be difficult to evolve to accommodate the needs of new applications. Prior researc...
Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica, ...
ICRA
2002
IEEE
144views Robotics» more  ICRA 2002»
15 years 8 months ago
Sensing Nanonewton Level Forces by Visually Tracking Structural Deformations
When assembling MEMS devices or manipulating biological cells it is often beneficial to have information about the force that is being applied to these objects. This force informa...
Michael A. Greminger, Ge Yang, Bradley J. Nelson
TKDE
2012
199views Formal Methods» more  TKDE 2012»
13 years 5 months ago
Subscriber Assignment for Wide-Area Content-Based Publish/Subscribe
— We study the problem of assigning subscribers to brokers in a wide-area content-based publish/subscribe system. A good assignment should consider both subscriber interests in t...
Albert Yu, Pankaj K. Agarwal, Jun Yang
FORTE
2000
15 years 4 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...