Sciweavers

6540 search results - page 1188 / 1308
» Data Stream Sharing
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
Improving peer-to-peer file distribution: winner doesn't have to take all
Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading m...
Ben Leong, Youming Wang, Su Wen, Cristina Carbunar...
CVPR
2008
IEEE
15 years 4 months ago
Hallucinating 3D facial shapes
This paper focuses on hallucinating a facial shape from a low-resolution 3D facial shape. Firstly, we give a constrained conformal embedding of 3D shape in R2 , which establishes ...
Gang Pan, Song Han, Zhaohui Wu
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 4 months ago
Performance Analysis and Special Issues of Broadband Strategies in the Computer Communication
Broadband communications consists of the technologies and equipment required to deliver packetbased digital voice, video, and data services to end users. Broadband affords end use...
S. S. Riaz Ahamed, D. Mahesh
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 4 months ago
Incorporating Side Information in Probabilistic Matrix Factorization with Gaussian Processes
Probabilistic matrix factorization (PMF) is a powerful method for modeling data associated with pairwise relationships, finding use in collaborative filtering, computational biolo...
Ryan Prescott Adams, George E. Dahl, Iain Murray
CONCURRENCY
2008
142views more  CONCURRENCY 2008»
15 years 4 months ago
Provenance trails in the Wings/Pegasus system
Our research focuses on creating and executing large-scale scientific workflows that often involve thousands of computations over distributed, shared resources. We describe an app...
Jihie Kim, Ewa Deelman, Yolanda Gil, Gaurang Mehta...
« Prev « First page 1188 / 1308 Last » Next »