Sciweavers

4323 search results - page 709 / 865
» Callback Implementations in C
Sort
View
138
Voted
SAC
2005
ACM
15 years 9 months ago
Node clustering based on link delay in P2P networks
Peer-to-peer (P2P) has become an important computing model because of its adaptation, self-organization and autonomy etc. But efficient organization of the nodes in P2P networks i...
Wei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon,...
118
Voted
CEAS
2005
Springer
15 years 9 months ago
Combating Spam through Legislation: A Comparative Analysis of US and European Approaches
Unsolicited Commercial Communication also known as spam - has traditionally been the most visible e-mail threat and has reached a point where it creates a major problem for the de...
Evangelos Moustakas, C. Ranganathan, Penny Duqueno...
132
Voted
GECCO
2005
Springer
112views Optimization» more  GECCO 2005»
15 years 9 months ago
Monotonic solution concepts in coevolution
Assume a coevolutionary algorithm capable of storing and utilizing all phenotypes discovered during its operation, for as long as it operates on a problem; that is, assume an algo...
Sevan G. Ficici
145
Voted
NOSSDAV
2005
Springer
15 years 9 months ago
MOPAR: a mobile peer-to-peer overlay architecture for interest management of massively multiplayer online games
In this paper we propose a fully distributed peer-to-peer (P2P) infrastructure supporting Networked Virtual Environment (NVE) applications, such as massively multiplayer online ga...
Anthony (Peiqun) Yu, Son T. Vuong
128
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....