Sciweavers

137 search results - page 22 / 28
» Hybrid Traitor Tracing
Sort
View
CONCURRENCY
2008
80views more  CONCURRENCY 2008»
13 years 7 months ago
Robust incentives via multi-level Tit-for-Tat
Much work has been done to address the need for incentive models in real deployed peer-to-peer networks. In this paper, we discuss problems found with the incentive model in a lar...
Qiao Lian, Yu Peng, Mao Yang, Zheng Zhang, Yafei D...
CORR
2008
Springer
126views Education» more  CORR 2008»
13 years 7 months ago
Non-Negative Matrix Factorization, Convexity and Isometry
Traditional Non-Negative Matrix Factorization (NMF) [19] is a successful algorithm for decomposing datasets into basis function that have reasonable interpretation. One problem of...
Nikolaos Vasiloglou, Alexander G. Gray, David V. A...
JUCS
2000
120views more  JUCS 2000»
13 years 7 months ago
Execution and Cache Performance of the Scheduled Dataflow Architecture
: This paper presents an evaluation of our Scheduled Dataflow (SDF) Processor. Recent focus in the field of new processor architectures is mainly on VLIW (e.g. IA-64), superscalar ...
Krishna M. Kavi, Joseph Arul, Roberto Giorgi
IJAMC
2010
134views more  IJAMC 2010»
13 years 6 months ago
HyperVerse: simulation and testbed reconciled
—When dealing with dynamic large-scale topologies such as those underlying peer-to-peer (P2P) distributed virtual environments (DVE), one inescapably reaches the point where eith...
Jean Botev, Markus Esch, Hermann Schloss, Ingo Sch...
ICCAD
2004
IEEE
100views Hardware» more  ICCAD 2004»
14 years 4 months ago
DynamoSim: a trace-based dynamically compiled instruction set simulator
Instruction set simulators are indispensable tools for the architectural exploration and verification of embedded systems. Different techniques have recently been proposed to spe...
Massimo Poncino, Jianwen Zhu