Sciweavers

17582 search results - page 3389 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
166
Voted
DIM
2006
ACM
15 years 8 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IMC
2006
ACM
15 years 8 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
116
Voted
NETGAMES
2006
ACM
15 years 8 months ago
Applying database replication to multi-player online games
Multi-player Online Games (MOGs) have emerged as popular data intensive applications in recent years. Being used by many players simultaneously, they require a high degree of faul...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
118
Voted
GROUP
2005
ACM
15 years 8 months ago
An optimization approach to group coupling in heterogeneous collaborative systems
Recent proliferation of computing devices has brought attention to heterogeneous collaborative systems, where key challenges arise from the resource limitations and disparities. S...
Carlos D. Correa, Ivan Marsic
115
Voted
MIR
2005
ACM
141views Multimedia» more  MIR 2005»
15 years 8 months ago
A mutual semantic endorsement approach to image retrieval and context provision
Learning semantics from annotated images to enhance content-based retrieval is an important research direction. In this paper, annotation data are assumed available for only a sub...
Jia Li
« Prev « First page 3389 / 3517 Last » Next »