Sciweavers

2485 search results - page 487 / 497
» Distributed parameter estimation in networks
Sort
View
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
14 years 9 days ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
ICS
2000
Tsinghua U.
14 years 6 days ago
A simulation-based study of scheduling mechanisms for a dynamic cluster environment
Scheduling of processes onto processors of a parallel machine has always been an important and challenging area of research. The issue becomes even more crucial and di cult as we ...
Yanyong Zhang, Anand Sivasubramaniam, José ...
NIPS
2000
13 years 10 months ago
A Neural Probabilistic Language Model
A goal of statistical language modeling is to learn the joint probability function of sequences of words in a language. This is intrinsically difficult because of the curse of dim...
Yoshua Bengio, Réjean Ducharme, Pascal Vinc...
ICPP
2009
IEEE
13 years 6 months ago
Heterogeneity-Aware Erasure Codes for Peer-to-Peer Storage Systems
Peer-to-peer (P2P) storage systems rely on data redundancy to obtain high levels of data availability. Among the existing data redundancy schemes, erasure coding is a widely adopte...
Lluis Pamies-Juarez, Pedro García Ló...
NOSSDAV
2009
Springer
14 years 3 months ago
Zebroid: using IPTV data to support peer-assisted VoD content delivery
P2P file transfers and streaming have already seen a tremendous growth in Internet applications. With the rapid growth of IPTV, the need to efficiently disseminate large volumes ...
Yih-Farn Robin Chen, Rittwik Jana, Daniel Stern, B...