Sciweavers

902 search results - page 88 / 181
» Opening Address
Sort
View
CAISE
2003
Springer
14 years 2 months ago
Processing Queries in a Large Peer-to-Peer System
While current search engines seem to easily handle the size of the data available on the Internet, they cannot provide fresh results. The most up-to-date data always resides on the...
Leonidas Galanis, Yuan Wang, Shawn R. Jeffery, Dav...
JSAC
2007
72views more  JSAC 2007»
13 years 8 months ago
Diverse: application-layer service differentiation in peer-to-peer communications
— The peer-to-peer communication paradigm, when used to disseminate bulk content or to stream real-time multimedia, has enjoyed the distinct advantage of scalability when compare...
Chuan Wu, Baochun Li
CHI
2010
ACM
13 years 6 months ago
A comparative evaluation on tree visualization methods for hierarchical structures with large fan-outs
Hierarchical structures with large fan-outs are hard to browse and understand. In the conventional node-link tree visualization, the screen quickly becomes overcrowded as users op...
Hyunjoo Song, Bo Hyoung Kim, Bongshin Lee, Jinwook...
JCIT
2010
172views more  JCIT 2010»
13 years 3 months ago
Conditional Sensor Deployment Using Evolutionary Algorithms
Sensor deployment is a critical issue, as it affects the cost and detection capabilities of a wireless sensor network. Although many previous efforts have addressed this issue, mo...
M. Sami Soliman, Guanzheng Tan
FOCS
2007
IEEE
14 years 3 months ago
Round Complexity of Authenticated Broadcast with a Dishonest Majority
Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...