Sciweavers

3104 search results - page 580 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
SIAMSC
2008
173views more  SIAMSC 2008»
14 years 11 months ago
A Fast Iterative Method for Eikonal Equations
In this paper we propose a novel computational technique to solve the Eikonal equation. The proposed method manages the list of active nodes and iteratively updates the solutions ...
Won-Ki Jeong, Ross T. Whitaker
AEI
2005
99views more  AEI 2005»
14 years 11 months ago
Comparison among five evolutionary-based optimization algorithms
Evolutionary algorithms (EAs) are stochastic search methods that mimic the natural biological evolution and/or the social behavior of species. Such algorithms have been developed ...
Emad Elbeltagi, Tarek Hegazy, Donald E. Grierson
TIFS
2008
208views more  TIFS 2008»
14 years 11 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
CAD
2005
Springer
14 years 11 months ago
Geometric algorithms for rapidly reconfigurable mold manufacturing of free-form objects
This paper presents geometric algorithms for developing a re-configurable tooling system for fabrication of freeform objects. The proposed method involves a mold block, with n fac...
Aditya Kelkar, Rakesh Nagi, Bahattin Koc
CN
2004
109views more  CN 2004»
14 years 11 months ago
Modeling correlations in web traces and implications for designing replacement policies
A number of web cache-related algorithms, such as replacement and prefetching policies, rely on specific characteristics present in the sequence of requests for efficient performa...
Konstantinos Psounis, An Zhu, Balaji Prabhakar, Ra...