Sciweavers

1415 search results - page 267 / 283
» Can Parallel Algorithms Enhance Serial Implementation
Sort
View
SICHERHEIT
2010
13 years 5 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
CVPR
2007
IEEE
14 years 9 months ago
Leveraging temporal, contextual and ordering constraints for recognizing complex activities in video
We present a scalable approach to recognizing and describing complex activities in video sequences. We are interested in long-term, sequential activities that may have several par...
Benjamin Laxton, Jongwoo Lim, David J. Kriegman
ICDCSW
2007
IEEE
14 years 1 months ago
A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to address them resp...
Mao Yang, Qinyuan Feng, Yafei Dai, Zheng Zhang
MIDDLEWARE
2005
Springer
14 years 1 months ago
An Optimal Overlay Topology for Routing Peer-to-Peer Searches
Unstructured peer-to-peer networks are frequently used as the overlay in various middleware toolkits for emerging applications, from content discovery to query result caching to di...
Brian F. Cooper
CASES
2007
ACM
13 years 11 months ago
Light-weight synchronization for inter-processor communication acceleration on embedded MPSoCs
Advances in semiconductor technologies have placed MPSoCs center stage as a standard architecture for embedded applications of ever increasing complexity. Efficient utilization of...
Chengmo Yang, Alex Orailoglu