Sciweavers

17018 search results - page 3331 / 3404
» From the How to the What
Sort
View
104
Voted
CCR
2006
76views more  CCR 2006»
15 years 18 days ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
CGF
2006
148views more  CGF 2006»
15 years 18 days ago
Analysis of Reproducing Real-World Appearance on Displays of Varying Dynamic Range
We conduct a series of experiments to investigate the desired properties of a tone mapping operator (TMO) and to design such an operator based on subjective data. We propose a nov...
Akiko Yoshida, Rafal Mantiuk, Karol Myszkowski, Ha...
98
Voted
CN
2006
91views more  CN 2006»
15 years 18 days ago
Reputation-based policies that provide the right incentives in peer-to-peer environments
Peer-to-peer are popular environments for exchanging services. A reputation mechanism is a proper means of discovering low-performing peers that fail to provide their services. In...
Thanasis G. Papaioannou, George D. Stamoulis
78
Voted
CN
2006
79views more  CN 2006»
15 years 18 days ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
CN
2006
113views more  CN 2006»
15 years 18 days ago
Failure recovery for structured p2p networks: Protocol design and performance under churn
Measurement studies indicate a high rate of node dynamics in p2p systems. In this paper, we address the question of how high a rate of node dynamics can be supported by structured...
Simon S. Lam, Huaiyu Liu
« Prev « First page 3331 / 3404 Last » Next »