Sciweavers

288 search results - page 35 / 58
» Kademlia for data storage and retrieval in enterprise networ...
Sort
View
INTERACT
2007
13 years 9 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
CIKM
2005
Springer
14 years 1 months ago
Query workload-aware overlay construction using histograms
Peer-to-peer (p2p) systems offer an efficient means of data sharing among a dynamically changing set of a large number of autonomous nodes. Each node in a p2p system is connected...
Georgia Koloniari, Yannis Petrakis, Evaggelia Pito...
SOFSEM
1997
Springer
13 years 11 months ago
Algorithms for Triangulated Terrains
Digital elevation models can represent many types of geographic data. One of the common digital elevation models is the triangulated irregular network also called TIN, or polyhed...
Marc J. van Kreveld
MM
2005
ACM
179views Multimedia» more  MM 2005»
14 years 1 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li
KDD
2005
ACM
181views Data Mining» more  KDD 2005»
14 years 8 months ago
Evaluating similarity measures: a large-scale study in the orkut social network
Online information services have grown too large for users to navigate without the help of automated tools such as collaborative filtering, which makes recommendations to users ba...
Ellen Spertus, Mehran Sahami, Orkut Buyukkokten