Sciweavers

1452 search results - page 98 / 291
» Full and Local Information in Distributed Decision Making
Sort
View
DRM
2007
Springer
15 years 10 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
IMC
2010
ACM
15 years 2 months ago
Improving content delivery using provider-aided distance information
Content delivery systems constitute a major portion of today's Internet traffic. While they are a good source of revenue for Internet Service Providers (ISPs), the huge volum...
Ingmar Poese, Benjamin Frank, Bernhard Ager, Georg...
CAISE
2005
Springer
15 years 10 months ago
Heuristic Horizontal XML Fragmentation
A challenging question is how XML can be used to support distributed databases. This leads to the problem of how to obtain a suitable, cost-efficient distribution design for XML do...
Hui Ma, Klaus-Dieter Schewe
ICML
1999
IEEE
16 years 5 months ago
Distributed Value Functions
Many interesting problems, such as power grids, network switches, and tra c ow, that are candidates for solving with reinforcement learningRL, alsohave properties that make distri...
Jeff G. Schneider, Weng-Keen Wong, Andrew W. Moore...
147
Voted
CONEXT
2005
ACM
15 years 6 months ago
Location based placement of whole distributed systems
The high bandwidth and low latency of the modern internet has made possible the deployment of distributed computing platforms. The XenoServer platform provides a distributed compu...
David Spence, Jon Crowcroft, Steven Hand, Timothy ...