Sciweavers

1434 search results - page 195 / 287
» Distributed Computing with Imperfect Randomness
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
14 years 3 months ago
On the runtime analysis of the 1-ANT ACO algorithm
The runtime analysis of randomized search heuristics is a growing field where, in the last two decades, many rigorous results have been obtained. These results, however, apply pa...
Benjamin Doerr, Frank Neumann, Dirk Sudholt, Carst...
CIKM
2010
Springer
13 years 8 months ago
Novel local features with hybrid sampling technique for image retrieval
In image retrieval, most existing approaches that incorporate local features produce high dimensional vectors, which lead to a high computational and data storage cost. Moreover, ...
Leszek Kaliciak, Dawei Song, Nirmalie Wiratunga, J...
ICCV
2003
IEEE
14 years 11 months ago
Machine Learning and Multiscale Methods in the Identification of Bivalve Larvae
This paper describes a novel application of support vector machines and multiscale texture and color invariants to a problem in biological oceanography: the identification of 6 sp...
Sanjay Tiwari, Scott Gallager
OSDI
2002
ACM
14 years 10 months ago
Taming Aggressive Replication in the Pangaea Wide-Area File System
Pangaea is a wide-area file system that supports data sharing among a community of widely distributed users. It is built on a symmetrically decentralized infrastructure that consi...
Yasushi Saito, Christos T. Karamanolis, Magnus Kar...