Sciweavers

5856 search results - page 725 / 1172
» Developing Query Patterns
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Model-based evaluation of search strategies in peer-to-peer networks
This paper exploits a previously developed analytical modeling framework to compare several variations of the basic flooding search strategy in unstructured decentralized peer-to...
Rossano Gaeta, Matteo Sereno
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
15 years 10 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 10 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
IPPS
2005
IEEE
15 years 10 months ago
Self-Managing Sensor-Based Middleware for Performance Monitoring and Data Integration in Grids
This paper describes a sensor-based middleware for performance monitoring and data integration in the Grid that is capable of self-management. The middleware unifies both system ...
Hong Linh Truong, Thomas Fahringer
MM
2005
ACM
87views Multimedia» more  MM 2005»
15 years 10 months ago
Toward emergent representations for video
Advanced systems for finding, using, sharing, and remixing video require high-level representations of video content. A number of researchers have taken top-down, analytic approac...
Ryan Shaw, Marc Davis