Sciweavers

879 search results - page 56 / 176
» Performance Evaluation of Routing Algorithms in RHiNET-2 Clu...
Sort
View
TC
2002
15 years 1 months ago
Coordinated En-Route Web Caching
Web caching is an important technique for reducing Internet access latency, network traffic, and server load. This paper investigates cache management strategies for en-route web ...
Xueyan Tang, Samuel T. Chanson
GLOBECOM
2007
IEEE
15 years 7 months ago
Centralized Scheduling Tree Construction Under Multi-Channel IEEE 802.16 Mesh Networks
—This paper focuses on routing tree construction problem and its influence on the performance of utilizing centralized scheduling in IEEE 802.16 mesh networks. We apply three rou...
Wenhua Jiao, Pin Jiang, Ruoju Liu, Ming Li
MOBIHOC
2002
ACM
16 years 1 months ago
Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks
We present a series of approximation algorithms for finding a small weakly-connected dominating set (WCDS) in a given graph to be used in clustering mobile ad hoc networks. The st...
Yuanzhu Peter Chen, Arthur L. Liestman
CCGRID
2009
IEEE
15 years 5 months ago
Energy-Efficient Cluster Computing via Accurate Workload Characterization
This paper presents an eco-friendly daemon that reduces power and energy consumption while better maintaining high performance via an accurate workload characterization that infer...
S. Huang, W. Feng
DEXA
2007
Springer
140views Database» more  DEXA 2007»
15 years 7 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao