Sciweavers

4744 search results - page 324 / 949
» Connected Computing
Sort
View
CONEXT
2010
ACM
15 years 2 months ago
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a serv...
George Dean Bissias, Brian Neil Levine, Ramesh K. ...
133
Voted
IPPS
2010
IEEE
15 years 2 months ago
Adapting to NAT timeout values in P2P overlay networks
Abstract--Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. Keep-alive messages serve ...
Richard Price, Peter Tiño
SG
2010
Springer
15 years 2 months ago
Interactive Design and Simulation of Net Sculptures
We present a graphical user interface that allows an artist to virtually design and visualize net sculptures. Net sculptures consist of net pieces that are seamlessly connected to ...
Grigore D. Pintilie, Peter Heppel, Janet Echelman
IEEECGIV
2009
IEEE
15 years 2 months ago
TagReel: A Visualization of Tag Relations among User Interests in the Social Tagging System
Social tagging systems provide users with the ability to share information and extend their field of knowledge. The purpose of this paper is to explore the tag relations of user in...
Joohee Bae, Kyungwon Lee
160
Voted
ICCV
2011
IEEE
14 years 4 months ago
Learning Cross-modality Similarity for Multinomial Data
Many applications involve multiple-modalities such as text and images that describe the problem of interest. In order to leverage the information present in all the modalities, on...
Yangqing Jia, Mathieu Salzmann, Trevor Darrell