Sciweavers

114 search results - page 22 / 23
» An Approach to Measuring the Performance of a Large-Scale Co...
Sort
View
WDAG
2001
Springer
131views Algorithms» more  WDAG 2001»
13 years 12 months ago
The Complexity of Synchronous Iterative Do-All with Crashes
Abstract. The ability to cooperate on common tasks in a distributed setting is key to solving a broad range of computation problems ranging from distributed search such as SETI to ...
Chryssis Georgiou, Alexander Russell, Alexander A....
CHI
2010
ACM
14 years 22 days ago
Exploring iterative and parallel human computation processes
Services like Amazon’s Mechanical Turk have opened the door for exploration of processes that outsource computation to humans. These human computation processes hold tremendous ...
Greg Little
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 5 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
IALP
2010
13 years 2 months ago
Sentence Similarity-Based Source Context Modelling in PBSMT
Target phrase selection, a crucial component of the state-of-the-art phrase-based statistical machine translation (PBSMT) model, plays a key role in generating accurate translation...
Rejwanul Haque, Sudip Kumar Naskar, Andy Way, Mart...
MOBISYS
2011
ACM
12 years 10 months ago
Exploiting FM radio data system for adaptive clock calibration in sensor networks
Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message pa...
Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, R...