Sciweavers

346 search results - page 5 / 70
» Propagating Probabilities in System P
Sort
View
ICDCS
2009
IEEE
14 years 5 months ago
ISP Friend or Foe? Making P2P Live Streaming ISP-Aware
Abstract: Current peer-to-peer systems are network-agnostic, often generating large volumes of unnecessary inter-ISP traffic. Although recent work has shown the benefits of ISP-a...
Fabio Picconi, Laurent Massoulié
UAI
1992
13 years 9 months ago
Exploring Localization in Bayesian Networks for Large Expert Systems
Current Bayesian net representations do not consider structure in the domain and include all variables in a homogeneous network. At any time, a human reasoner in a large domain ma...
Yang Xiang, David Poole, Michael P. Beddoes
MOBICOM
2005
ACM
14 years 2 months ago
PeopleNet: engineering a wireless virtual social network
People often seek information by asking other people even when they have access to vast reservoirs of information such as the Internet and libraries. This is because people are gr...
Mehul Motani, Vikram Srinivasan, Pavan Nuggehalli
EDBT
2008
ACM
123views Database» more  EDBT 2008»
14 years 8 months ago
XML data integration in SixP2P: a theoretical framework
In the paper we discuss the problem of data integration in a P2P environment. In such setting each peer stores schema of its local data, mappings between the schema and schemas of...
Tadeusz Pankowski
TKDE
2010
272views more  TKDE 2010»
13 years 6 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta