Sciweavers

1845 search results - page 212 / 369
» Computing the Angularity Tolerance
Sort
View
117
Voted
ICDCS
2005
IEEE
15 years 8 months ago
Keyword Search in DHT-Based Peer-to-Peer Networks
Existing techniques for keyword/attribute search in structured P2P overlays suffer from several problems: unbalanced load, hot spots, fault tolerance, storage redundancy, and unab...
Yuh-Jzer Joung, Chien-Tse Fang, Li-Wei Yang
103
Voted
PODC
2005
ACM
15 years 8 months ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod
151
Voted
DSVIS
2005
Springer
15 years 8 months ago
A Calculus for the Refinement and Evolution of Multi-user Mobile Applications
The calculus outlined in this paper provides a formal architectural framework for describing and reasoning about the properties of multi-user and mobile distributed interactive sys...
W. Greg Phillips, T. C. Nicholas Graham, Christoph...
114
Voted
GREC
2005
Springer
15 years 8 months ago
Sketch Parameterization Using Curve Approximation
This paper presents a method of parameterization for online freehand drawing objects based on a piecewise cubic Bezier curve approximation. The target is to represent sketches in a...
Zhengxing Sun, Wei Wang, Lisha Zhang, Jing Liu
133
Voted
SAC
2004
ACM
15 years 8 months ago
A robust deception-free coalition formation model
We study two properties of coalition formation algorithms, very important for their application in real-life scenarios: robustness and tolerance to some agent misbehaviors. The st...
María-Victoria Belmonte, Ricardo Conejo, Jo...