Sciweavers

7457 search results - page 1337 / 1492
» The Dynamics of Computing Agent Systems
Sort
View
ICPP
2008
IEEE
15 years 11 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
121
Voted
ICPR
2008
IEEE
15 years 11 months ago
Adaptive nonstationary regression analysis
The problem of finding the most appropriate subset of features or regressors is the generic challenge of Machine Learning problems like regression estimation or pattern recognitio...
Olga Krasotkina, Vadim Mottl
IPPS
2008
IEEE
15 years 10 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee
167
Voted
WCNC
2008
IEEE
15 years 10 months ago
Senslets- Applets for the Sensor Internet
The Sensor Internet provides access to sensor services by connecting sensor nodes to the Internet infrastructure. To achieve this, current solutions rely on fixed access points or ...
Frank Siegemund, Muhammad Haroon, Junaid Ansari, P...
DSN
2007
IEEE
15 years 10 months ago
User Discrimination through Structured Writing on PDAs
This paper explores whether features of structured writing can serve to discriminate users of handheld devices such as Palm PDAs. Biometric authentication would obviate the need t...
Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Kill...
« Prev « First page 1337 / 1492 Last » Next »