Sciweavers

2645 search results - page 529 / 529
» time 2003
Sort
View
SOSP
2003
ACM
14 years 4 months ago
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet traffic. This paper probes deeply into modern P2P file sharing systems and the forces that...
P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu...
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
14 years 21 days ago
Localized construction of bounded degree and planar spanner for wireless ad hoc networks
We propose a novel localized algorithm that constructs a bounded degree and planar spanner for wireless ad hoc networks modeled by unit disk graph (UDG). Every node only has to kn...
Yu Wang 0003, Xiang-Yang Li
ASIACRYPT
2003
Springer
14 years 20 days ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
FIMH
2003
Springer
14 years 20 days ago
A Levelset Based Method for Segmenting the Heart in 3D+T Gated SPECT Images
Keywords Levelset methods were introduced in medical images segmentation by Malladi et al in 1995. In this paper, we propose several improvements of the original method to speed u...
Arnaud Charnoz, Diane Lingrand, Johan Montagnat
AAAI
2008
13 years 9 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...