Sciweavers

492 search results - page 64 / 99
» Encrypted Shared Data Spaces
Sort
View
ISPA
2005
Springer
14 years 3 months ago
Redundancy Schemes for High Availability in DHTs
High availability in peer-to-peer DHTs requires data redundancy. This paper takes user download behavior into account to evaluate redundancy schemes in data storage and share syste...
Fan Wu, Tongqing Qiu, YueQuan Chen, Guihai Chen
CSE
2009
IEEE
14 years 4 months ago
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals
—In this paper we present a design methodology for the identification and development of a suitable hardware platform (including dedicated hardware accelerators) for the data pl...
Sebastian Hessel, David Szczesny, Shadi Traboulsi,...
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
14 years 10 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
ECIR
2009
Springer
14 years 6 months ago
Synchronous Collaborative Information Retrieval: Techniques and Evaluation
Synchronous Collaborative Information Retrieval refers to systems that support multiple users searching together at the same time in order to satisfy a shared information need. To ...
Colum Foley, Alan F. Smeaton
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
14 years 4 months ago
Simultaneous people tracking and localization for social robots using external laser range finders
—Robust localization of robots and reliable tracking of people are both critical requirements for the deployment of service robots in real-world environments. In crowded public s...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...