Sciweavers

4072 search results - page 716 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
IPPS
2010
IEEE
14 years 9 months ago
Highly scalable parallel sorting
Sorting is a commonly used process with a wide breadth of applications in the high performance computing field. Early research in parallel processing has provided us with comprehen...
Edgar Solomonik, Laxmikant V. Kalé
IJCNN
2006
IEEE
15 years 5 months ago
Reinforcement Learning Control for Biped Robot Walking on Uneven Surfaces
— Biped robots based on the concept of (passive) dynamic walking are far simpler than the traditional fullycontrolled walking robots, while achieving a more natural gait and cons...
Shouyi Wang, Jelmer Braaksma, Robert Babuska, Daan...
PDP
2009
IEEE
15 years 6 months ago
Phoenix: A Runtime Environment for High Performance Computing on Chip Multiprocessors
Abstract—Execution of applications on upcoming highperformance computing (HPC) systems introduces a variety of new challenges and amplifies many existing ones. These systems will...
Avneesh Pant, Hassan Jafri, Volodymyr V. Kindraten...
GLOBECOM
2009
IEEE
15 years 6 months ago
Carrier to Interference Ratio Analysis for the Shotgun Cellular System
—This paper analyzes the carrier-to-interference ratio of the so-called shotgun cellular system (SCS). In the SCS, basestations are placed randomly according to a two-dimensional...
Prasanna Madhusudhanan, Juan G. Restrepo, Youjian ...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 5 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang