Sciweavers

7683 search results - page 1433 / 1537
» Distributed Computing with the CLAN Network
Sort
View
123
Voted
ICDCSW
2006
IEEE
15 years 9 months ago
Improve Searching by Reinforcement Learning in Unstructured P2Ps
— Existing searching schemes in unstructured P2Ps can be categorized as either blind or informed. The quality of query results in blind schemes is low. Informed schemes use simpl...
Xiuqi Li, Jie Wu
119
Voted
ICDCSW
2006
IEEE
15 years 9 months ago
Fuzzy Trust for Peer-to-Peer Systems
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
Nathan Griffiths, Kuo-Ming Chao, Muhammad Younas
99
Voted
ICDCSW
2006
IEEE
15 years 9 months ago
The Key Knob
Locks are mechanical fastening devices used on various kinds of objects like doors and vehicles, and they can be released using a certain type of key. They have a long history, fr...
Alois Ferscha, Clemens Holzmann, Stefan Resmerita
119
Voted
ISPDC
2006
IEEE
15 years 9 months ago
How to Achieve High Throughput with Dynamic Tree-Structured Coterie
Data replication permits a better network bandwidth utilization and minimizes the effect of latency in large-scale systems such as computing grids. However, the cost of maintainin...
Ivan Frain, Abdelaziz Mzoughi, Jean Paul Bahsoun
ICDCSW
2005
IEEE
15 years 9 months ago
State Checksum and Its Role in System Stabilization
Although a self-stabilizing system that suffers from a transient fault is guaranteed to converge to a legitimate state after a finite number of steps, the convergence can be slow ...
Chin-Tser Huang, Mohamed G. Gouda
« Prev « First page 1433 / 1537 Last » Next »