Sciweavers

8978 search results - page 1658 / 1796
» Parallel Genetic Algorithms
Sort
View
SPAA
2010
ACM
15 years 9 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
DCOSS
2010
Springer
15 years 9 months ago
MetroTrack: Predictive Tracking of Mobile Events Using Mobile Phones
We propose to use mobile phones carried by people in their everyday lives as mobile sensors to track mobile events. We argue that sensor-enabled mobile phones are best suited to de...
Gahng-Seop Ahn, Mirco Musolesi, Hong Lu, Reza Olfa...
CONCUR
2001
Springer
15 years 9 months ago
The Control of Synchronous Systems, Part II
Abstract. A controller is an environment for a system that achieves a particular control objective by providing inputs to the system without constraining the choices of the system....
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
HPDC
2000
IEEE
15 years 9 months ago
Performance Evaluation of a Firewall-Compliant Globus-based Wide-Area Cluster System
In this paper, we present a performance evaluation of a wide-area cluster system based on a rewallenabled Globus metacomputing toolkit. In order to establish communication links ...
Yoshio Tanaka, Motonori Hirano, Mitsuhisa Sato, Hi...
180
Voted
ICDCS
2000
IEEE
15 years 9 months ago
Scheduling Heuristics for Data Requests in an Oversubscribed Network with Priorities and Deadlines
Providing up-to-date input to users’ applications is an important data management problem for a distributed computing environment, where each data storage location and intermedi...
Mitchell D. Theys, Noah Beck, Howard Jay Siegel, M...
« Prev « First page 1658 / 1796 Last » Next »