Sciweavers

842 search results - page 146 / 169
» Robust intra-document locations
Sort
View
ICDCS
2006
IEEE
14 years 3 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
IPPS
2006
IEEE
14 years 3 months ago
Relationships between communication models in networks using atomic registers
A distributed system is commonly modelled by a graph where nodes represent processors and there is an edge between two processors if and only if they can communicate directly. In ...
Lisa Higham, Colette Johnen
IPPS
2006
IEEE
14 years 3 months ago
Improving cooperation in peer-to-peer systems using social networks
Rational and selfish nodes in P2P systems usually lack effective incentives to cooperate, contributing to the increase of free-riders, and degrading the system performance. Variou...
Wenyu Wang, Li Zhao, Ruixi Yuan
IROS
2006
IEEE
150views Robotics» more  IROS 2006»
14 years 3 months ago
A Hybrid Visual Servo System Considering the Workspace Boundary Singularity
– Robotic systems like humanoid frequently move to undesirable pose while being visually controlled at the boundary of its workspace, because the working environment is quite hug...
Do Hyoung Kim, Myung Jin Chung
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 3 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang