Sciweavers

631 search results - page 104 / 127
» Improving Internet interaction: From theory to practice
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 2 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
GECCO
2005
Springer
166views Optimization» more  GECCO 2005»
14 years 1 months ago
The emulation of social institutions as a method of coevolution
This paper offers a novel approach to coevolution based on the sociological theory of symbolic interactionism. It provides a multi-agent computational model along with experimenta...
Deborah Vakas Duong, John J. Grefenstette
AEPIA
2002
159views more  AEPIA 2002»
13 years 7 months ago
Analysing Rough Sets weighting methods for Case-Based Reasoning Systems
Case-Based Reasoning systems retrieve cases using a similarity function based on the K-NN or some derivatives. These functions are sensitive to irrelevant, interacting or noisy fe...
Maria Salamó, Elisabet Golobardes
OOPSLA
2010
Springer
13 years 6 months ago
Teaching and training developer-testing techniques and tool support
Developer testing is a type of testing where developers test their code as they write it, as opposed to testing done by a separate quality assurance organization. Developer testin...
Tao Xie, Jonathan de Halleux, Nikolai Tillmann, Wo...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Competitive Spectrum Management with Incomplete Information
An important issue in wireless communication is the interaction between selfish and independent wireless communication systems in the same frequency band. Due to the selfish natur...
Yair Noam, Amir Leshem, Hagit Messer