Sciweavers

5790 search results - page 894 / 1158
» Distributed programming with distributed authorization
Sort
View
MOBICOM
2004
ACM
15 years 8 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
IPPS
2003
IEEE
15 years 7 months ago
Extending OpenMP to Support Slipstream Execution Mode
OpenMP has emerged as a widely accepted standard for writing shared memory programs. Hardware-specific extensions such as data placement are usually needed to improve the scalabi...
Khaled Z. Ibrahim, Gregory T. Byrd
WORDS
2003
IEEE
15 years 7 months ago
Improving Dependability of Service Oriented Architectures for Pervasive Computing
Service Oriented Programming - which combines Distributed Object Compunting, Component Based and webbased concepts - has recently emerged as a promising approach to develop dynami...
Domenico Cotroneo, Cristiano di Flora, Stefano Rus...
ATAL
2003
Springer
15 years 7 months ago
Risk-averse auction agents
Auctions are an important means for purchasing material in the era of e-commerce. Research on auctions often studies them in isolation. In practice, however, auction agents are pa...
Yaxin Liu, Richard Goodwin, Sven Koenig
GECCO
2009
Springer
145views Optimization» more  GECCO 2009»
15 years 7 months ago
Investigating and exploiting the bias of the weighted hypervolume to articulate user preferences
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weight...
Anne Auger, Johannes Bader, Dimo Brockhoff, Eckart...