Sciweavers

34170 search results - page 6546 / 6834
» Optimization
Sort
View
GLOBECOM
2009
IEEE
15 years 8 months ago
Competitive Wireless Access for Data Streaming over Vehicle-to-Roadside Communications
This paper considers the problem of optimal and competitive wireless access for data streaming over vehicleto-roadside (V2R) communication. In a service area, the onboard units (OB...
Dusit Niyato, Ekram Hossain, Ping Wang
ICDCS
2007
IEEE
15 years 8 months ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 8 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
ACSAC
2004
IEEE
15 years 8 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
ASIAN
2004
Springer
153views Algorithms» more  ASIAN 2004»
15 years 8 months ago
Chi-Square Matrix: An Approach for Building-Block Identification
This paper presents a line of research in genetic algorithms (GAs), called building-block identification. The building blocks (BBs) are common structures inferred from a set of sol...
Chatchawit Aporntewan, Prabhas Chongstitvatana
« Prev « First page 6546 / 6834 Last » Next »