Sciweavers

4345 search results - page 195 / 869
» Temporal Constraint Networks
Sort
View
CCR
2004
90views more  CCR 2004»
15 years 5 months ago
A constraint satisfaction approach to testbed embedding services
Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
92
Voted
CORR
2008
Springer
71views Education» more  CORR 2008»
15 years 5 months ago
On the Secure Degrees of Freedom of Wireless X Networks
Previous work showed that the X network with M transmitters, N receivers has MN M+N-1 degrees of freedom. In this work we study the degrees of freedom of the X network with secrecy...
Tiangao Gou, Syed Ali Jafar
KDD
2012
ACM
194views Data Mining» more  KDD 2012»
13 years 7 months ago
A sparsity-inducing formulation for evolutionary co-clustering
Traditional co-clustering methods identify block structures from static data matrices. However, the data matrices in many applications are dynamic; that is, they evolve smoothly o...
Shuiwang Ji, Wenlu Zhang, Jun Liu
BROADNETS
2006
IEEE
15 years 11 months ago
Distributed Job Scheduling based on Multiple Constraints Anycast Routing
— As the popularity of resource-constrained devices such as hand-held computers increases, a new network service offloading complex processing tasks towards computational resour...
Tim Stevens, Marc De Leenheer, Filip De Turck, Bar...
ADBIS
2009
Springer
140views Database» more  ADBIS 2009»
15 years 11 months ago
Optimizing Maintenance of Constraint-Based Database Caches
Abstract. Caching data reduces user-perceived latency and often enhances availability in case of server crashes or network failures. DB caching aims at local processing of declarat...
Joachim Klein 0002, Susanne Braun