Sciweavers

7329 search results - page 1275 / 1466
» Network Extractor Protocols
Sort
View
IPTPS
2003
Springer
15 years 9 months ago
A Simple Fault Tolerant Distributed Hash Table
We introduce a distributed hash table (DHT) with logarithmic degree and logarithmic dilation. We show two lookup algorithms. The first has a message complexity of log n and is ro...
Moni Naor, Udi Wieder
INFOCOM
2002
IEEE
15 years 9 months ago
Exact sampling of TCP Window States
We demonstrate how to apply Coupling from the Past, a simulation technique for exact sampling, to Markov chains based on TCP variants. This approach provides a new, statistically ...
Ashish Goel, Michael Mitzenmacher
MDM
2010
Springer
193views Communications» more  MDM 2010»
15 years 8 months ago
Data-Based Agreement for Inter-vehicle Coordination
Abstract—Data-based agreement is increasingly used to implement traceable coordination across mobile entities such as adhoc networked (autonomous) vehicles. In our work, we focus...
Brahim Ayari, Abdelmajid Khelil, Kamel Saffar, Nee...
GECCO
2009
Springer
107views Optimization» more  GECCO 2009»
15 years 8 months ago
Evolving distributed algorithms with genetic programming: election
In this paper, we present a detailed analysis of the application of Genetic Programming to the evolution of distributed algorithms. This research field has many facets which make...
Thomas Weise, Michael Zapf
UML
2001
Springer
15 years 8 months ago
Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study
: There are many different ways to specify the requirements of complex software systems, and the optimal methods often vary according to the problem domain. We apply and compare tw...
Geri Georg, Jores Bieman, Robert B. France
« Prev « First page 1275 / 1466 Last » Next »