Sciweavers

10909 search results - page 291 / 2182
» Evaluating Backup Algorithms
Sort
View
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
15 years 11 months ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart
ICNSC
2008
IEEE
15 years 11 months ago
Cscan: A Correlation-based Scheduling Algorithm for Wireless Sensor Networks
— Dynamic scheduling management in wireless sensor networks is one of the most challenging problems in long lifetime monitoring applications. In this paper, we propose and evalua...
Qingquan Zhang, Yu Gu, Tian He, Gerald E. Sobelman
137
Voted
GLOBECOM
2007
IEEE
15 years 11 months ago
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts
— A large number of overlay protocols have been developed, almost all of which assume each host has two-way communication capability. However, this does not hold as the deploymen...
Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, X...
IPPS
2007
IEEE
15 years 11 months ago
Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm
In this paper we address the problem of selfish behavior in ad hoc networks. We propose a strategy driven approach which aims at enforcing cooperation between network participant...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
DSN
2002
IEEE
15 years 9 months ago
Performance Analysis of a Consensus Algorithm Combining Stochastic Activity Networks and Measurements
Protocols which solve agreement problems are essential building blocks for fault tolerant distributed applications. While many protocols have been published, little has been done ...
Andrea Coccoli, Péter Urbán, Andrea ...