Sciweavers

2560 search results - page 456 / 512
» Contributions to zero-sum problems
Sort
View
SOSP
2003
ACM
15 years 8 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
SAC
2010
ACM
15 years 6 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
AP2PS
2009
IEEE
15 years 6 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
BIBM
2009
IEEE
155views Bioinformatics» more  BIBM 2009»
15 years 6 months ago
Towards Reliable Isoform Quantification Using RNA-Seq Data
Background: In eukaryotes, alternative splicing often generates multiple splice variants from a single gene. Here weexplore the use of RNA sequencing (RNA-Seq) datasets to address...
Brian E. Howard, Steffen Heber
ISPASS
2009
IEEE
15 years 6 months ago
The data-centricity of Web 2.0 workloads and its impact on server performance
Advances in network performance and browser technologies, coupled with the ubiquity of internet access and proliferation of users, have lead to the emergence of a new class of web...
Moriyoshi Ohara, Priya Nagpurkar, Yohei Ueda, Kazu...