Sciweavers

1405 search results - page 215 / 281
» We Are No Longer A Priesthood
Sort
View
INFOCOM
2007
IEEE
15 years 7 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
93
Voted
P2P
2007
IEEE
101views Communications» more  P2P 2007»
15 years 6 months ago
Grid Resource Scheduling with Gossiping Protocols
Abstract— Grid resource providers can use gossiping to disseminate their available resource state to remote regions of the grid to attract application load. Pairwise gossiping pr...
Deger Cenk Erdil, Michael J. Lewis
CLEF
2007
Springer
15 years 6 months ago
Amharic-English Information Retrieval with Pseudo Relevance Feedback
We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 20...
Atelach Alemu Argaw
95
Voted
EMSOFT
2007
Springer
15 years 6 months ago
Optimal task placement to improve cache performance
Most recent embedded systems use caches to improve their average performance. Current timing analyses are able to compute safe timing guarantees for these systems, if tasks are ru...
Gernot Gebhard, Sebastian Altmeyer
GECCO
2007
Springer
241views Optimization» more  GECCO 2007»
15 years 6 months ago
Binary ant algorithm
When facing dynamic optimization problems the goal is no longer to find the extrema, but to track their progression through the space as closely as possible. Over these kind of ov...
Carlos Fernandes, Agostinho C. Rosa, Vitorino Ramo...