Sciweavers

2924 search results - page 515 / 585
» Lower Bounds in Distributed Computing
Sort
View
119
Voted
ICDCS
2010
IEEE
15 years 6 months ago
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
—There are several analytical results on distributed hash tables (DHTs) that can tolerate Byzantine faults. Unfortunately, in such systems, operations such as data retrieval and ...
Maxwell Young, Aniket Kate, Ian Goldberg, Martin K...
103
Voted
PG
2007
IEEE
15 years 9 months ago
Precomputed Visibility Cuts for Interactive Relighting with Dynamic BRDFs
This paper presents a novel PRT-based method that uses precomputed visibility cuts for interactive relighting with all-frequency environment maps and arbitrary dynamic BRDFs. Our ...
Oskar Åkerlund, Mattias Unger, Rui Wang
112
Voted
ATAL
2007
Springer
15 years 8 months ago
On the robustness of preference aggregation in noisy environments
In an election held in a noisy environment, agents may unintentionally perturb the outcome by communicating faulty preferences. We investigate this setting by introducing a theore...
Ariel D. Procaccia, Jeffrey S. Rosenschein, Gal A....
102
Voted
IWCMC
2006
ACM
15 years 8 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
129
Voted
IWCMC
2006
ACM
15 years 8 months ago
On the robustness of grid-based deployment in wireless sensor networks
Grid-based sensor deployment is an effective and efficient practice for provisioning wireless sensor networks. Previous work has addressed grid-based deployment of sensors in orde...
Kenan Xu, Glen Takahara, Hossam S. Hassanein