Sciweavers

220 search results - page 36 / 44
» Understanding Peer-level Performance in BitTorrent: A Measur...
Sort
View
ICNP
2003
IEEE
14 years 24 days ago
A File-Centric Model for Peer-to-Peer File Sharing Systems
Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative ...
Li Zou, Mostafa H. Ammar
DMKD
2003
ACM
114views Data Mining» more  DMKD 2003»
14 years 24 days ago
Deriving link-context from HTML tag tree
HTML anchors are often surrounded by text that seems to describe the destination page appropriately. The text surrounding a link or the link-context is used for a variety of tasks...
Gautam Pant
APGV
2006
ACM
111views Visualization» more  APGV 2006»
13 years 11 months ago
Discrimination and estimation of time-to-contact for approaching traffic using a desktop environment
Each year, thousands of pedestrians are injured or killed in traffic accidents. Identifying pedestrians' perceptual capabilities for street crossing decisions is an important...
A. Elizabeth Seward, Daniel H. Ashmead, Bobby Bode...
EUMAS
2006
13 years 9 months ago
E*plore-ing the Simulation Design Space
One of the major puzzles in performing multi-agent-based simulations is the validity of their results. Optimisation of simulation parameters can lead to results that can be deceit...
Luis Antunes, Helder Coelho, João Balsa
JSW
2007
106views more  JSW 2007»
13 years 7 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain