Sciweavers

5948 search results - page 1010 / 1190
» Computing Robust Counter-Strategies
Sort
View
MIDDLEWARE
2007
Springer
15 years 9 months ago
Hybrid Dissemination: Adding Determinism to Probabilistic Multicasting in Large-Scale P2P Systems
Abstract. Epidemic protocols have demonstrated remarkable scalability and robustness in disseminating information on internet-scale, dynamic P2P systems. However, popular instances...
Spyros Voulgaris, Maarten van Steen
160
Voted
MIDDLEWARE
2007
Springer
15 years 9 months ago
Vector-Field Consistency for Ad-Hoc Gaming
Abstract. Developing distributed multiplayer games for ad-hoc networks is challenging. Consistency of the replicated shared state is hard to ensure at a low cost. Current consisten...
Nuno Santos, Luís Veiga, Paulo Ferreira
140
Voted
MIDDLEWARE
2007
Springer
15 years 9 months ago
Peer-to-peer brokering of planning meta-data
In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and removed. Current middleware approaches use sta...
Johannes Oudenstad, Frank Eliassen, Eli Gjø...
160
Voted
NOLISP
2007
Springer
15 years 9 months ago
Word Recognition with a Hierarchical Neural Network
In this paper we propose a feedforward neural network for syllable recognition. The core of the recognition system is based on a hierarchical architecture initially developed for ...
Xavier Domont, Martin Heckmann, Heiko Wersing, Fra...
112
Voted
OTM
2007
Springer
15 years 9 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
« Prev « First page 1010 / 1190 Last » Next »