Sciweavers

2746 search results - page 523 / 550
» Case Study in Survivable Network System Analysis
Sort
View
ICDE
2005
IEEE
123views Database» more  ICDE 2005»
16 years 2 months ago
High-Availability Algorithms for Distributed Stream Processing
Stream-processing systems are designed to support an emerging class of applications that require sophisticated and timely processing of high-volume data streams, often originating...
Alex Rasin, Jeong-Hyon Hwang, Magdalena Balazinska...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 7 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
MM
2006
ACM
184views Multimedia» more  MM 2006»
15 years 7 months ago
Extraction of social context and application to personal multimedia exploration
Personal media collections are often viewed and managed along the social dimension, the places we spend time at and the people we see, thus tools for extracting and using this inf...
Brett Adams, Dinh Q. Phung, Svetha Venkatesh
IGARSS
2010
14 years 11 months ago
Lidar education at Georgia Tech
The Georgia Tech Research Institute teamed with a local undergraduate women's institution, Agnes Scott College, to develop an eyesafe lidar for atmospheric remote sensing as ...
Gary Gimmestad, Leanne West
DIAGRAMS
2006
Springer
15 years 3 months ago
From Diagrams to Models by Analogical Transfer
Abstract. We present a method for constructing a teleological model of a drawing of a physical device through analogical transfer of the teleological model of the same device in an...
Patrick W. Yaner, Ashok K. Goel