Sciweavers

538 search results - page 43 / 108
» Applying Interchangeability Techniques to the Distributed Br...
Sort
View
SAC
2005
ACM
15 years 8 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
MIDDLEWARE
2009
Springer
15 years 7 months ago
How to Keep Your Head above Water While Detecting Errors
Today’s distributed systems need runtime error detection to catch errors arising from software bugs, hardware errors, or unexpected operating conditions. A prominent class of err...
Ignacio Laguna, Fahad A. Arshad, David M. Grothe, ...
ICIP
2001
IEEE
16 years 4 months ago
Video similarity detection with video signature clustering
The proliferation of video content on the web makes similarity detection an indispensable tool in web data management, searching, and navigation. We have previously proposed a com...
Sen-Ching S. Cheung, Avideh Zakhor
GROUP
2010
ACM
15 years 1 months ago
The human factors of consistency maintenance in multiplayer computer games
Consistency maintenance (CM) techniques are a crucial part of many distributed systems, and are particularly important in networked games. In this paper we describe a framework of...
Cheryl Savery, T. C. Nicholas Graham, Carl Gutwin
DEXA
2008
Springer
117views Database» more  DEXA 2008»
15 years 5 months ago
Space-Partitioning-Based Bulk-Loading for the NSP-Tree in Non-ordered Discrete Data Spaces
Properly-designed bulk-loading techniques are more efficient than the conventional tuple-loading method in constructing a multidimensional index tree for a large data set. Although...
Gang Qian, Hyun-Jeong Seok, Qiang Zhu, Sakti Prama...