Sciweavers

5344 search results - page 184 / 1069
» Privacy-Preserving Set Operations
Sort
View
PDPTA
2004
15 years 4 months ago
Spores: A Push and Pull Peer-to-Peer File Sharing Approach
Spores is a push and pull peer-to-peer method of file sharing and storage, making use of publicly available space on the network. A user stores a file by pushing it to a set of pe...
Thomas E. Portegys
131
Voted
USENIX
2000
15 years 4 months ago
Dynamic Function Placement for Data-Intensive Cluster Computing
Optimally partitioning application and filesystem functionality within a cluster of clients and servers is a difficult problem due to dynamic variations in application behavior, r...
Khalil Amiri, David Petrou, Gregory R. Ganger, Gar...
FOGA
1996
15 years 4 months ago
A Study of Fixed-Length Subset Recombination
While bit-based, order-based and real-valued genetic algorithms have been wellstudied in the literature, the xed-length subset representation has received relativelylittle attenti...
Kelly D. Crawford, Cory J. Hoelting, Roger L. Wain...
GEOINFORMATICA
2006
86views more  GEOINFORMATICA 2006»
15 years 3 months ago
Decreasing Computational Time of Urban Cellular Automata Through Model Portability
This paper investigates how portability of a model between different computer operating systems can lead to increased efficiency in code execution. The portability problem is not a...
Charles Dietzel, Keith C. Clarke
117
Voted
DSD
2010
IEEE
131views Hardware» more  DSD 2010»
15 years 1 months ago
A Test Bench for Distortion-Energy Optimization of a DSP-Based H.264/SVC Decoder
This paper describes an OMAP-based real-time test bench to find the Pareto frontier of an H.264/SVC decoder within a distortion-energy optimization space. A metric to estimate vide...
F. Pescador, E. Juarez, D. Samper, C. Sanz, Micka&...