Sciweavers

4335 search results - page 657 / 867
» Privatizing Constraint Optimization
Sort
View
159
Voted
NETWORKING
2007
15 years 4 months ago
Construction of a Proxy-Based Overlay Skeleton Tree for Large-Scale Real-Time Group Communications
Abstract. We consider the problem of constructing a proxy-based overlay skeleton tree (POST) in the backbone service domain of a two-tier overlay multicast infrastructure. Spanning...
Jun Guo, Sanjay Jha
128
Voted
SIROCCO
2007
15 years 4 months ago
Design of Minimal Fault Tolerant On-Board Networks: Practical Constructions
Abstract. The problem we consider originates from the design of efficient on-board networks in satellites (also called Traveling Wave Tube Amplifiers). Signals incoming in the net...
Jean-Claude Bermond, Frédéric Giroir...
110
Voted
NIPS
2003
15 years 4 months ago
Extreme Components Analysis
Principal components analysis (PCA) is one of the most widely used techniques in machine learning and data mining. Minor components analysis (MCA) is less well known, but can also...
Max Welling, Felix V. Agakov, Christopher K. I. Wi...
124
Voted
DELOS
2000
15 years 4 months ago
Analysis of the Effectiveness-Efficiency Dependence for Image Retrieval
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
Martin Heczko, Daniel A. Keim, Roger Weber
ATMN
1996
15 years 4 months ago
Dynamic time sharing: a new approach for congestion management
A new approach for bandwidth allocation and congestion control is reported in this paper, which is of the Rate Controlled admission with Priority Scheduling service type. It is ca...
Adrian Popescu, Parag Pruthi