Sciweavers

11588 search results - page 105 / 2318
» Will They Like This
Sort
View
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 3 months ago
New Software Development Paradigms and Possible Adoption for Security
EGovernment would be a lot easier if it could be handled like eBusiness. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security...
Matthias Günter, Michael Gisler, Bianca von B...
HOTOS
2003
IEEE
14 years 3 months ago
High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two
Peer-to-peer storage aims to build large-scale, reliable and available storage from many small-scale unreliable, low-availability distributed hosts. Data redundancy is the key to ...
Charles Blake, Rodrigo Rodrigues
ICDM
2003
IEEE
135views Data Mining» more  ICDM 2003»
14 years 3 months ago
An Algorithm for the Exact Computation of the Centroid of Higher Dimensional Polyhedra and its Application to Kernel Machines
The Support Vector Machine (SVM) solution corresponds to the centre of the largest sphere inscribed in version space. Alternative approaches like Bayesian Point Machines (BPM) and...
Frédéric Maire
IEEEAMS
2003
IEEE
14 years 3 months ago
Rich and Scalable Peer-to-Peer Search with SHARK
SHARK is a novel concept and middleware service for search in peer-to-peer (P2P) networks. Rather than flooding a network like Gnutella or imposing numerical IDs on objects like d...
Jan Mischke, Burkhard Stiller
AP2PC
2003
Springer
14 years 3 months ago
Agent-Based Social Assessment of Shared Resources
Prior to the access to decentralized resources like web services and shared files in peer-to-peer networks, the user needs to be provided with accurate information about these res...
Matthias Nickles, Gerhard Weiß