Sciweavers

492 search results - page 64 / 99
» Encrypted Shared Data Spaces
Sort
View
137
Voted
ISPA
2005
Springer
15 years 9 months ago
Redundancy Schemes for High Availability in DHTs
High availability in peer-to-peer DHTs requires data redundancy. This paper takes user download behavior into account to evaluate redundancy schemes in data storage and share syste...
Fan Wu, Tongqing Qiu, YueQuan Chen, Guihai Chen
153
Voted
CSE
2009
IEEE
15 years 10 months ago
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals
—In this paper we present a design methodology for the identification and development of a suitable hardware platform (including dedicated hardware accelerators) for the data pl...
Sebastian Hessel, David Szczesny, Shadi Traboulsi,...
145
Voted
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
16 years 4 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
117
Voted
ECIR
2009
Springer
16 years 26 days ago
Synchronous Collaborative Information Retrieval: Techniques and Evaluation
Synchronous Collaborative Information Retrieval refers to systems that support multiple users searching together at the same time in order to satisfy a shared information need. To ...
Colum Foley, Alan F. Smeaton
151
Voted
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
15 years 10 months ago
Simultaneous people tracking and localization for social robots using external laser range finders
—Robust localization of robots and reliable tracking of people are both critical requirements for the deployment of service robots in real-world environments. In crowded public s...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...