Sciweavers

3116 search results - page 550 / 624
» Design and implementation of network puzzles
Sort
View
135
Voted
EUROMICRO
2006
IEEE
15 years 10 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
133
Voted
ICDCS
2006
IEEE
15 years 10 months ago
A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe
Publish/Subscribe systems provide a useful platform for delivering data (events) from publishers to subscribers in an anonymous fashion in distributed networks. In this paper, we ...
Emmanuelle Anceaume, Maria Gradinariu, Ajoy Kumar ...
139
Voted
IJCNN
2006
IEEE
15 years 10 months ago
Reinforcement Learning Control for Biped Robot Walking on Uneven Surfaces
— Biped robots based on the concept of (passive) dynamic walking are far simpler than the traditional fullycontrolled walking robots, while achieving a more natural gait and cons...
Shouyi Wang, Jelmer Braaksma, Robert Babuska, Daan...
146
Voted
IPPS
2006
IEEE
15 years 10 months ago
A segment-based DSM supporting large shared object space
This paper introduces a software DSM that can extend its shared object space exceeding 4GB in a 32bit commodity cluster environment. This is achieved through the dynamic memory ma...
Benny Wang-Leung Cheung, Cho-Li Wang
141
Voted
WCRE
2006
IEEE
15 years 10 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit