Sciweavers

241 search results - page 11 / 49
» Object duplication for improving reliability
Sort
View
AISS
2010
119views more  AISS 2010»
13 years 7 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
12 years 10 days ago
Learning from crowds in the presence of schools of thought
Crowdsourcing has recently become popular among machine learning researchers and social scientists as an effective way to collect large-scale experimental data from distributed w...
Yuandong Tian, Jun Zhu
P2P
2009
IEEE
114views Communications» more  P2P 2009»
14 years 4 months ago
Why Kad Lookup Fails
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup pe...
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yo...
CAISE
1999
Springer
14 years 2 months ago
Design of Object Caching in a CORBA OTM System
Abstract. CORBA Object Transaction Monitors (OTM) refer to a middleware technology that enable the building of transactional, objectoriented information systems running in distribu...
Thomas Sandholm, Stefan Tai, Dirk Slama, Eamon Wal...
ICPR
2008
IEEE
14 years 4 months ago
3D localization of partially buried object in unstructured environment
This paper describes a method to localize objects which are partially buried in an unstructured environment. The objects are limited to surfaces of revolution in the present study...
Kenichi Maruyama, Koji Oka, Ryuichi Takase, Yoshih...