Sciweavers

4013 search results - page 715 / 803
» computing 2002
Sort
View
WINET
2002
138views more  WINET 2002»
15 years 7 days ago
An Architecture for Secure Wide-Area Service Discovery
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...
COLT
2010
Springer
14 years 10 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura
93
Voted
CORR
2011
Springer
170views Education» more  CORR 2011»
14 years 7 months ago
Ecosystem Viable Yields
The World Summit on Sustainable Development (Johannesburg, 2002) encouraged the application of the ecosystem approach by 2010. However, at the same Summit, the signatory States un...
Michel De Lara, Eladio Ocaña Anaya, Ricardo...
INFOCOM
2011
IEEE
14 years 4 months ago
Approximation algorithms for throughput maximization in wireless networks with delay constraints
—We study the problem of throughput maximization in multi-hop wireless networks with end-to-end delay constraints for each session. This problem has received much attention start...
Guanhong Pei, V. S. Anil Kumar, Srinivasan Parthas...
148
Voted
IPPS
2002
IEEE
15 years 5 months ago
Performance Prediction Technology for Agent-Based Resource Management in Grid Environments
Resource management constitutes an important infrastructural component of a computational grid environment. The aim of grid resource management is to efficiently schedule applicat...
Junwei Cao, Stephen A. Jarvis, Daniel P. Spooner, ...