Sciweavers

7853 search results - page 1359 / 1571
» Learning from Each Other
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SIGGRAPH
2009
ACM
14 years 4 months ago
RACBVHs: random-accessible compressed bounding volume hierarchies
We present a novel bounding volume hierarchy (BVH) compression and decompression method transparently supporting random access on the compressed BVHs. To support random access on ...
Tae-Joon Kim, Bochang Moon, Duksu Kim, Sung-Eui Yo...
SMA
2009
ACM
117views Solid Modeling» more  SMA 2009»
14 years 4 months ago
Discrete physics using metrized chains
Over the last fifty years, there have been numerous efforts to develop from first principles a comprehensive discrete formulation of geometric physics, including Whitney’s ge...
Antonio DiCarlo, Franco Milicchio, Alberto Paoluzz...
CCGRID
2008
IEEE
14 years 4 months ago
A Stable Broadcast Algorithm
—Distributing large data to many nodes, known as a broadcast or a multicast, is an important operation in parallel and distributed computing. Most previous broadcast algorithms e...
Kei Takahashi, Hideo Saito, Takeshi Shibata, Kenji...
ICPADS
2008
IEEE
14 years 4 months ago
Dynamic Resource Allocation in Enterprise Systems
It is common that Internet service hosting centres use several logical pools to assign server resources to different applications, and that they try to achieve the highest total r...
James Wen Jun Xue, Adam P. Chester, Ligang He, Ste...
« Prev « First page 1359 / 1571 Last » Next »