Sciweavers

323 search results - page 33 / 65
» Range-capable Distributed Hash Tables
Sort
View
CVPR
2009
IEEE
14 years 3 months ago
Disambiguating the recognition of 3D objects
We propose novel algorithms for the detection, segmentation, recognition, and pose estimation of threedimensional objects. Our approach initially infers geometric primitives to de...
Gutemberg Guerra-Filho
ANSS
2008
IEEE
14 years 3 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
SPAA
2009
ACM
14 years 9 months ago
A DoS-resilient information system for dynamic data management
Denial of service (DoS) attacks are arguably one of the most cumbersome problems in the Internet. This paper presents a distributed information system (over a set of completely co...
Matthias Baumgart, Christian Scheideler, Stefan Sc...
KESAMSTA
2007
Springer
14 years 2 months ago
A Resource Discovery Method Based on Multi-agents in P2P Systems
A peer-to-peer (P2P) system consists of a number of decentralized distributed network nodes that are capable of sharing resources without centralized supervision. Many application...
Yasushi Kambayashi, Yoshikuni Harada
ALGORITHMICA
1998
73views more  ALGORITHMICA 1998»
13 years 8 months ago
Linear Probing and Graphs
Mallows and Riordan showed in 1968 that labeled trees with a small number of inversions are related to labeled graphs that are connected and sparse. Wright enumerated sparse connec...
Donald E. Knuth