Sciweavers

3083 search results - page 574 / 617
» Active Peer to Peer
Sort
View
INFOCOM
2012
IEEE
11 years 10 months ago
Reverse-engineering BitTorrent: A Markov approximation perspective
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchan...
PAMI
2012
11 years 10 months ago
Rhythmic Brushstrokes Distinguish van Gogh from His Contemporaries: Findings via Automated Brushstroke Extraction
— Art historians have long observed the highly characteristic brushstroke styles of Vincent van Gogh and have relied on discerning these styles for authenticating and dating his ...
Jia Li, Lei Yao, Ella Hendriks, James Z. Wang
SDM
2012
SIAM
452views Data Mining» more  SDM 2012»
11 years 10 months ago
Density-based Projected Clustering over High Dimensional Data Streams
Clustering of high dimensional data streams is an important problem in many application domains, a prominent example being network monitoring. Several approaches have been lately ...
Irene Ntoutsi, Arthur Zimek, Themis Palpanas, Peer...
AAAI
2012
11 years 10 months ago
Quality Expectation-Variance Tradeoffs in Crowdsourcing Contests
We examine designs for crowdsourcing contests, where participants compete for rewards given to superior solutions of a task. We theoretically analyze tradeoffs between the expecta...
Xi Alice Gao, Yoram Bachrach, Peter Key, Thore Gra...
AAAI
2012
11 years 10 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...