Sciweavers

8080 search results - page 1314 / 1616
» From Computer Networks to Agent Networks
Sort
View
P2P
2008
IEEE
176views Communications» more  P2P 2008»
15 years 11 months ago
Towards an Incentive Mechanism for Peer-to-Peer Multimedia Live Streaming Systems
Incentive mechanisms are essential components of peer-topeer systems for file sharing such as BitTorrent, since they enforce peers to share their resources and to participate. Re...
Thomas Silverston, Olivier Fourmaux, Jon Crowcroft
WIMOB
2008
IEEE
15 years 11 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
ACSD
2007
IEEE
136views Hardware» more  ACSD 2007»
15 years 11 months ago
Mapping Applications to Tiled Multiprocessor Embedded Systems
Modern multiprocessor embedded systems execute a large number of tasks on shared processors and handle their complex communications on shared communication networks. Traditional m...
Lothar Thiele, Iuliana Bacivarov, Wolfgang Haid, K...
IJCNN
2007
IEEE
15 years 11 months ago
Spectral Clustering of Synchronous Spike Trains
— In this paper a clustering algorithm that learns the groups of synchronized spike trains directly from data is proposed. Clustering of spike trains based on the presence of syn...
António R. C. Paiva, Sudhir Rao, Il Park, J...
QEST
2007
IEEE
15 years 11 months ago
Probabilistic Model Checking Modulo Theories
— Probabilistic models are widely used to analyze embedded, networked, and more recently biological systems. Existing numerical analysis techniques are limited to finitestate mo...
Björn Wachter, Lijun Zhang, Holger Hermanns
« Prev « First page 1314 / 1616 Last » Next »