Sciweavers

1057 search results - page 145 / 212
» Peer-to-Peer utility maximization
Sort
View
PCI
2005
Springer
15 years 3 months ago
Tuning Blocked Array Layouts to Exploit Memory Hierarchy in SMT Architectures
Cache misses form a major bottleneck for memory-intensive applications, due to the significant latency of main memory accesses. Loop tiling, in conjunction with other program tran...
Evangelia Athanasaki, Kornilios Kourtis, Nikos Ana...
RECOMB
2005
Springer
15 years 3 months ago
Examination of the tRNA Adaptation Index as a Predictor of Protein Expression Levels
Phenotypic differences between closely-related species may arise from differential expression regimes, rather than different gene complements. Knowledge of cellular protein levels ...
Orna Man, Joel L. Sussman, Yitzhak Pilpel
WPES
2004
ACM
15 years 3 months ago
Assessing global disclosure risk in masked microdata
In this paper, we introduce a general framework for microdata and three disclosure risk measures (minimal, maximal and weighted). We classify the attributes from a given microdata...
Traian Marius Truta, Farshad Fotouhi, Daniel C. Ba...
ANTSW
2004
Springer
15 years 3 months ago
An Ant Approach to Membership Overlay Design
Designing an optimal overlay communication network for a set of processes on the Internet is a central problem of peer-to-peer (P2P) computing. Such a network defines membership a...
Vittorio Maniezzo, Marco A. Boschetti, Márk...
ATAL
2004
Springer
15 years 3 months ago
Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction
In this paper, we investigate a model of a combinatorial, procurement multi-attribute auction, in which each sales item is defined by several attributes called quality, the buyer...
Takayuki Suyama, Makoto Yokoo