Sciweavers

226 search results - page 40 / 46
» The Wide Trail Design Strategy
Sort
View
AIMS
2009
Springer
13 years 11 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
WWW
2008
ACM
14 years 7 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani
SIGMOD
2008
ACM
101views Database» more  SIGMOD 2008»
14 years 6 months ago
Pay-as-you-go user feedback for dataspace systems
A primary challenge to large-scale data integration is creating semantic equivalences between elements from different data sources that correspond to the same real-world entity or...
Shawn R. Jeffery, Michael J. Franklin, Alon Y. Hal...
WWW
2010
ACM
14 years 1 months ago
Money, glory and cheap talk: analyzing strategic behavior of contestants in simultaneous crowdsourcing contests on TopCoder.com
Crowdsourcing is a new Web phenomenon, in which a firm takes a function once performed in-house and outsources it to a crowd, usually in the form of an open contest. Designing ef...
Nikolay Archak
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
14 years 1 months ago
1000 Trials: An empirically validated end effector that robustly grasps objects from the floor
—Unstructured, human environments present great challenges and opportunities for robotic manipulation and grasping. Robots that reliably grasp household objects with unknown or u...
Zhe Xu, Travis Deyle, Charles C. Kemp