Sciweavers

5995 search results - page 957 / 1199
» Algorithmic Game Theory
Sort
View
P2P
2007
IEEE
161views Communications» more  P2P 2007»
15 years 11 months ago
The BitCod Client: A BitTorrent Clone using Network Coding
Network coding is an emerging field of research with sound and mature theory supporting it. Recent works shows that it has many benefits like improved fault tolerance, higher ...
Danny Bickson, Roy Borer
ESOP
2007
Springer
15 years 11 months ago
On the Implementation of Construction Functions for Non-free Concrete Data Types
Abstract. Many algorithms use concrete data types with some additional invariants. The set of values satisfying the invariants is often a set of representatives for the equivalence...
Frédéric Blanqui, Thérè...
CVPR
2009
IEEE
15 years 11 months ago
Recovering Specular Surfaces Using Curved Line Images
We present a new shape-from-distortion framework for recovering specular (reflective/refractive) surfaces. While most existing approaches rely on accurate correspondences between 2...
Yuanyuan Ding, Jingyi Yu, Peter Sturm
GECCO
2007
Springer
213views Optimization» more  GECCO 2007»
15 years 11 months ago
Genetically programmed learning classifier system description and results
An agent population can be evolved in a complex environment to perform various tasks and optimize its job performance using Learning Classifier System (LCS) technology. Due to the...
Gregory Anthony Harrison, Eric W. Worden
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 11 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...