Sciweavers

963 search results - page 117 / 193
» On Computation of Performance Bounds of Optimal Index Assign...
Sort
View
FOCS
2000
IEEE
15 years 3 months ago
How Bad is Selfish Routing?
We consider the problem of routing traffic to optimize the performance of a congested network. We are given a network, a rate of traffic between each pair of nodes, and a latency ...
Tim Roughgarden, Éva Tardos
IWCMC
2006
ACM
15 years 5 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
EUROPAR
2010
Springer
15 years 29 days ago
Non-clairvoyant Scheduling of Multiple Bag-of-Tasks Applications
The bag-of-tasks application model, albeit simple, arises in many application domains and has received a lot of attention in the scheduling literature. Previous works propose eithe...
Henri Casanova, Matthieu Gallet, Fréd&eacut...
DAC
1994
ACM
15 years 4 months ago
BDD Variable Ordering for Interacting Finite State Machines
We address the problem of obtaining good variable orderings for the BDD representation of a system of interacting finite state machines (FSMs). Orderings are derived from the comm...
Adnan Aziz, Serdar Tasiran, Robert K. Brayton
JMLR
2008
117views more  JMLR 2008»
14 years 12 months ago
Active Learning by Spherical Subdivision
We introduce a computationally feasible, "constructive" active learning method for binary classification. The learning algorithm is initially formulated for separable cl...
Falk-Florian Henrich, Klaus Obermayer