Sciweavers

5333 search results - page 976 / 1067
» Optimizing Computer System Configurations
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 8 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
RTSS
2007
IEEE
15 years 8 months ago
Rendezvous Planning in Mobility-Assisted Wireless Sensor Networks
Recent research shows that significant energy saving can be achieved in wireless sensor networks by using mobile elements (MEs) capable of carrying data mechanically. However, th...
Guoliang Xing, Tian Wang, Zhihui Xie, Weijia Jia
INFOCOM
2007
IEEE
15 years 8 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
GECCO
2007
Springer
150views Optimization» more  GECCO 2007»
15 years 8 months ago
Credit assignment in adaptive memetic algorithms
Adaptive Memetic Algorithms couple an evolutionary algorithm with a number of local search heuristics for improving the evolving solutions. They are part of a broad family of meta...
J. E. Smith
GECCO
2007
Springer
345views Optimization» more  GECCO 2007»
15 years 8 months ago
A novel approach to automatic music transcription using electronic synthesis and genetic algorithms
This paper presents a novel approach to the problem of automatic music transcription using electronic synthesis with genetic algorithms. Although the problem is well known and di...
Gustavo Reis, Francisco Fernández de Vega