Sciweavers

2465 search results - page 167 / 493
» Distributed knowledge
Sort
View
PODC
2005
ACM
14 years 2 months ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod
ICASSP
2010
IEEE
13 years 9 months ago
Note onset detection using rhythmic structure
In this paper we explore the relationship between the temporal and rhythmic structure of musical audio signals. Using automatically extracted rhythmic structure we present a rhyth...
Norberto Degara, Aantonio Pena, Matthew E. P. Davi...
SIGECOM
2011
ACM
170views ECommerce» more  SIGECOM 2011»
13 years 1 days ago
Only valuable experts can be valued
Suppose a principal Alice wishes to reduce her uncertainty regarding some future payoff. Consider a self-proclaimed expert Bob that may either be an informed expert knowing an ex...
Moshe Babaioff, Liad Blumrosen, Nicolas S. Lambert...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 2 months ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole
AOSD
2009
ACM
14 years 4 months ago
Dependent advice: a general approach to optimizing history-based aspects
Many aspects for runtime monitoring are history-based: they contain pieces of advice that execute conditionally, based on the observed execution history. History-based aspects are...
Eric Bodden, Feng Chen, Grigore Rosu