Sciweavers

502 search results - page 95 / 101
» Deploying a New Hash Algorithm
Sort
View
CCS
2009
ACM
14 years 2 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
14 years 2 months ago
Active Learning with Generalized Queries
—Active learning can actively select or construct examples to label to reduce the number of labeled examples needed for building accurate classifiers. However, previous works of...
Jun Du, Charles X. Ling
IROS
2009
IEEE
159views Robotics» more  IROS 2009»
14 years 2 months ago
Data gathering tours for mobile robots
— We study a path planning problem which arises when multiple robots are used to gather data from stationary devices with wireless communication capabilities. Each device has a g...
Deepak Bhadauria, Volkan Isler
ATAL
2009
Springer
14 years 2 months ago
From DPS to MAS to ...: continuing the trends
The most important and interesting of the computing challenges we are facing are those that involve the problems and opportunities afforded by massive decentralization and disinte...
Michael N. Huhns
MIDDLEWARE
2009
Springer
14 years 1 months ago
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...