Sciweavers

1748 search results - page 303 / 350
» Security Models for Heterogeneous Networking
Sort
View
INFOCOM
2006
IEEE
15 years 9 months ago
Using Repeated Games to Design Incentive-Based Routing Systems
Abstract— Incorporating pricing information in routing systems has been explored in various contexts and fashions. In this paper we examine certain fundamental properties importa...
Michael Afergan
INFOCOM
2006
IEEE
15 years 9 months ago
Optimizing Caching Policy for Loss Recovery in Reliable Multicast
— In reliable multicast, data packets can be cached at some nodes such as repair servers for future possible retransmission in loss recovery schemes. How to cache packets to opti...
Feng Xie, Gang Feng, Xun Yang
HPDC
2005
IEEE
15 years 8 months ago
A new metric for robustness with application to job scheduling
Scheduling strategies for parallel and distributed computing have mostly been oriented toward performance, while striving to achieve some notion of fairness. With the increase in ...
Darin England, Jon B. Weissman, Jayashree Sadagopa...
ICMI
2004
Springer
183views Biometrics» more  ICMI 2004»
15 years 8 months ago
Agent and library augmented shared knowledge areas (ALASKA)
This paper reports on an NSF-funded effort now underway to integrate three learning technologies that have emerged and matured over the past decade; each has presented compelling ...
Eric R. Hamilton
109
Voted
WEBI
2004
Springer
15 years 8 months ago
Adaptation and Personalization in Web-based Learning Support Systems
In order to achieve optimal efficiency in a learning process, individual learner needs his/her own personalized assistance. For a web-based open and dynamic learning environment, ...
Lisa Fan