Sciweavers

5948 search results - page 906 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICCV
2007
IEEE
15 years 10 months ago
Co-Tracking Using Semi-Supervised Support Vector Machines
This paper treats tracking as a foreground/background classification problem and proposes an online semisupervised learning framework. Initialized with a small number of labeled ...
Feng Tang, Shane Brennan, Qi Zhao, Hai Tao
ICDCS
2007
IEEE
15 years 10 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
ICDE
2007
IEEE
167views Database» more  ICDE 2007»
15 years 10 months ago
Load Shedding for Window Joins on Multiple Data Streams
We consider the problem of semantic load shedding for continuous queries containing window joins on multiple data streams and propose a robust approach that is effective with the ...
Yan-Nei Law, Carlo Zaniolo
IPPS
2007
IEEE
15 years 10 months ago
Novel Broadcast/Multicast Protocols for Dynamic Sensor Networks
: In this paper, we have proposed a time efficient, energy saving and robust broadcast/multicast protocol for reconfigurable cluster-based sensor network. In our broadcast protocol...
Wei Chen, Islam A. K. M. Muzahidul, Mohan Malkani,...
PRDC
2007
IEEE
15 years 10 months ago
Failure Detectors and Extended Paxos for k-Set Agreement
Failure detector class Ωk has been defined in [18] as an extension to failure detector Ω, and an algorithm has been given in [16] to solve k-set agreement using Ωk in async...
Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu