Sciweavers

1266 search results - page 159 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
WWW
2003
ACM
16 years 4 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
GRID
2005
Springer
15 years 9 months ago
Automatic clustering of grid nodes
— In a grid-computing environment, resource selection and scheduling depend on the network topology connecting the computation nodes. This paper presents a method to hierarchical...
Qiang Xu, Jaspal Subhlok
ICPR
2006
IEEE
16 years 5 months ago
Robust Tracking of Multiple People in Crowds Using Laser Range Scanners
Laser based people tracking systems have been developed for mobile robotic or intelligent surveillance areas. Existing systems rely on laser point clustering to extract object loc...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
MICAI
2007
Springer
15 years 10 months ago
Learning Performance in Evolutionary Behavior Based Mobile Robot Navigation
Abstract. In this paper we utilize information theory to study the impact in learning performance of various motivation and environmental configurations. This study is done within...
Tomás Arredondo Vidal, Wolfgang Freund, C&e...
ISCOPE
1998
Springer
15 years 8 months ago
Dynamic Reconfiguration and Virtual Machine Management in the Harness Metacomputing System
Metacomputing frameworks have received renewed attention of late, fueled both by advances in hardware and networking, and by novel concepts such as computational grids. However the...
Mauro Migliardi, Jack Dongarra, Al Geist, Vaidy S....