Sciweavers

7683 search results - page 1257 / 1537
» Distributed Computing with the CLAN Network
Sort
View
169
Voted
GI
2003
Springer
15 years 10 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
NDSS
2002
IEEE
15 years 9 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
AIMS
2010
Springer
15 years 9 months ago
On the Combined Behavior of Autonomous Resource Management Agents
Abstract. A central issue in autonomic management is how to coordinate several autonomic management processes, which is assumed to require significant knowledge exchange. This stu...
Siri Fagernes, Alva L. Couch
172
Voted
UAI
2001
15 years 6 months ago
A Bayesian Multiresolution Independence Test for Continuous Variables
In this paper we present a method of computing the posterior probability of conditional independence of two or more continuous variables from data, examined at several resolutions...
Dimitris Margaritis, Sebastian Thrun
OSDI
2004
ACM
16 years 5 months ago
Energy-Efficiency and Storage Flexibility in the Blue File System
A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless...
Edmund B. Nightingale, Jason Flinn
« Prev « First page 1257 / 1537 Last » Next »