Sciweavers

3686 search results - page 389 / 738
» Comprehensive comprehensions
Sort
View
98
Voted
ICPP
2007
IEEE
15 years 10 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
110
Voted
ICPP
2007
IEEE
15 years 10 months ago
SOR: A Static File Assignment Strategy Immune to Workload Characteristic Assumptions in Parallel I/O Systems
The problem of statically assigning nonpartitioned files in a parallel I/O system has been extensively investigated. A basic workload characteristic assumption of existing solutio...
Tao Xie 0004
ICPP
2007
IEEE
15 years 10 months ago
Difficulty-aware Hybrid Search in Peer-to-Peer Networks
—By combining an unstructured protocol with a DHT-based global index, hybrid peer-to-peer (P2P) improves search efficiency in terms of query recall and response time. The major c...
Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni
109
Voted
ICRA
2007
IEEE
132views Robotics» more  ICRA 2007»
15 years 10 months ago
Heterogeneous Leg Stiffness and Roll in Dynamic Running
— Legged robots are by nature strongly non-linear, high-dimensional systems whose full complexity permits neither tractable mathematical analysis nor comprehensive numerical stud...
Samuel Burden, Jonathan Clark, Joel Weingarten, Ha...
124
Voted
ICRA
2007
IEEE
164views Robotics» more  ICRA 2007»
15 years 10 months ago
Affect Recognition in Robot Assisted Rehabilitation of Children with Autism Spectrum Disorder
–This paper presents a novel affect-sensitive human-robot interaction framework for rehabilitation of children with autism spectrum disorder (ASD). The overall aim is to enable t...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...