Sciweavers

8647 search results - page 1285 / 1730
» The Container Selection Problem
Sort
View
MMM
2007
Springer
127views Multimedia» more  MMM 2007»
15 years 11 months ago
Optimizing the Throughput of Data-Driven Based Streaming in Heterogeneous Overlay Network
Recently, much attention has been paid on data-driven (or swarm-like) based live streaming systems due to its rapid growth in deployment over Internet. In such systems, nodes rando...
Meng Zhang, Chunxiao Chen, Yongqiang Xiong, Qian Z...
WECWIS
2007
IEEE
148views ECommerce» more  WECWIS 2007»
15 years 11 months ago
The Core and Shapley Value Analysis for Cooperative Formation of Procurement Networks
Formation of high value procurement networks involves a bottom-up assembly of complex production, assembly, and exchange relationships through supplier selection and contracting d...
T. S. Chandrashekar, Y. Narahari
ESORICS
2007
Springer
15 years 11 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
129
Voted
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
15 years 11 months ago
Sex and death: towards biologically inspired heuristics for constraint handling
Constrained continuous optimization is still an interesting field of research. Many heuristics have been proposed in the last decade. Most of them are based on penalty functions....
Oliver Kramer, Stephan Brügger, Dejan Lazovic
ECRTS
2006
IEEE
15 years 11 months ago
Sensitivity Analysis for Fixed-Priority Real-Time Systems
At early stages in the design of real-time embedded applications, the timing attributes of the computational activities are often incompletely specified or subject to changes. Lat...
Enrico Bini, Marco Di Natale, Giorgio C. Buttazzo
« Prev « First page 1285 / 1730 Last » Next »