Sciweavers

3669 search results - page 668 / 734
» Rendering
Sort
View
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
VEE
2005
ACM
149views Virtualization» more  VEE 2005»
14 years 3 months ago
Instrumenting annotated programs
Instrumentation is commonly used to track application behavior: to collect program profiles; to monitor component health and performance; to aid in component testing; and more. P...
Marina Biberstein, Vugranam C. Sreedhar, Bilha Men...
AIED
2005
Springer
14 years 3 months ago
Teaching the evolution of behavior with SuperDuperWalker
SuperDuperWalker is a software-based framework for experiments on the evolution of locomotion. It simulates the behavior of evolving agents in a 3D physical simulation environment ...
Lee Spector, Jon Klein, Kyle Harrington, Raymond C...
CEEMAS
2005
Springer
14 years 3 months ago
How Our Beliefs Contribute to Interpret Actions
Abstract. In update logic the interpretation of an action is often assumed to be independent from the agents’ beliefs about the situation (see [BMS04] or [Auc05]). In this paper ...
Guillaume Aucher
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay