Sciweavers

837 search results - page 136 / 168
» Simulation Based Approach to Evaluate a Distributed Search E...
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
CIKM
2011
Springer
14 years 3 months ago
A probabilistic method for inferring preferences from clicks
Evaluating rankers using implicit feedback, such as clicks on documents in a result list, is an increasingly popular alternative to traditional evaluation methods based on explici...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
CEC
2005
IEEE
15 years 5 months ago
Multi-objective optimisation of the pump scheduling problem using SPEA2
Abstract- Significant operational cost and energy savings can be achieved by optimising the schedules of pumps, which pump water from source reservoirs to storage tanks, in Water ...
Manuel López-Ibáñez, T. Devi ...
JPDC
2011
219views more  JPDC 2011»
14 years 10 months ago
BlobSeer: Next-generation data management for large scale infrastructures
As data volumes increase at a high speed in more and more application fields of science, engineering, information services, etc., the challenges posed by data-intensive computing...
Bogdan Nicolae, Gabriel Antoniu, Luc Bougé,...
ISSTA
2000
ACM
15 years 7 months ago
UML-Based integration testing
Increasing numbers of software developers are using the Unified Modeling Language (UML) and associated visual modeling tools as a basis for the design and implementation of their ...
Jean Hartmann, Claudio Imoberdorf, Michael Meising...