Sciweavers

2652 search results - page 497 / 531
» Optimal design in collaborative design network
Sort
View
133
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 8 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 8 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah
114
Voted
NPC
2007
Springer
15 years 8 months ago
Performance Prediction for Mappings of Distributed Applications on PC Clusters
Abstract. Distributed applications running on clusters may be composed of several components with very different performance requirements. The FlowVR middleware allows the develop...
Sylvain Jubertie, Emmanuel Melin
ICAC
2006
IEEE
15 years 8 months ago
Hardness of Approximation and Greedy Algorithms for the Adaptation Problem in Virtual Environments
— Over the past decade, wide-area distributed computing has emerged as a powerful computing paradigm. Virtual machines greatly simplify wide-area distributed computing ing the ab...
Ananth I. Sundararaj, Manan Sanghi, John R. Lange,...
132
Voted
ICPPW
2006
IEEE
15 years 8 months ago
Retargeting Image-Processing Algorithms to Varying Processor Grain Sizes
Embedded computing architectures can be designed to meet a variety of application specific requirements. However, optimized hardware can require compiler support to realize the po...
Sam Sander, Linda M. Wills