Sciweavers

6907 search results - page 1099 / 1382
» Securing distributed adaptation
Sort
View
PODC
2010
ACM
14 years 9 months ago
Meeting the deadline: on the complexity of fault-tolerant continuous gossip
In this paper, we introduce the problem of Continuous Gossip in which rumors are continually and dynamically injected throughout the network. Each rumor has a deadline, and the go...
Chryssis Georgiou, Seth Gilbert, Dariusz R. Kowals...
PPSN
2010
Springer
14 years 9 months ago
Topography-Aware Sensor Deployment Optimization with CMA-ES
Abstract. Wireless Sensor Networks (WSN) have been studied intensively for various applications such as monitoring and surveillance. Sensor deployment is an essential part of WSN, ...
Vahab Akbarzadeh, Albert Hung-Ren Ko, Christian Ga...
SIAMSC
2010
132views more  SIAMSC 2010»
14 years 9 months ago
New Algorithms for Optimal Online Checkpointing
Frequently, the computation of derivatives for optimizing time-dependent problems is based on the integration of the adjoint differential equation. For this purpose, the knowledge...
Philipp Stumm, Andrea Walther
TKDE
2010
137views more  TKDE 2010»
14 years 9 months ago
A Survey on Transfer Learning
—A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. How...
Sinno Jialin Pan, Qiang Yang
CLOUDCOM
2010
Springer
14 years 9 months ago
REMEM: REmote MEMory as Checkpointing Storage
Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively stu...
Hui Jin, Xian-He Sun, Yong Chen, Tao Ke
« Prev « First page 1099 / 1382 Last » Next »