Sciweavers

4650 search results - page 646 / 930
» Generating and evaluating evaluative arguments
Sort
View
120
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
Limiting Sybil Attacks in Structured P2P Networks
— One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks: malicious parties can compromise the network by generat...
Hosam Rowaihy, William Enck, Patrick McDaniel, Tom...
IPPS
2007
IEEE
15 years 11 months ago
A Landmark-based Index Architecture for General Similarity Search in Peer-to-Peer Networks
The indexing of complex data and similarity search plays an important role in many application areas. Traditional centralized index structure can not scale with the rapid prolifer...
Xiaoyu Yang, Yiming Hu
133
Voted
IROS
2007
IEEE
85views Robotics» more  IROS 2007»
15 years 11 months ago
Electrostatic latching for inter-module adhesion, power transfer, and communication in modular robots
— A simple and robust inter-module latch is possibly the most important component of a modular robotic system. This paper describes a latch based on electric fields and capaciti...
Mustafa Emre Karagozler, Jason Campbell, Gary K. F...
IWPC
2007
IEEE
15 years 11 months ago
Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code
The paper addresses the problem of concept location in source code by presenting an approach which combines Formal Concept Analysis (FCA) and Latent Semantic Indexing (LSI). In th...
Denys Poshyvanyk, Andrian Marcus
LICS
2007
IEEE
15 years 11 months ago
Symmetric Datalog and Constraint Satisfaction Problems in Logspace
We introduce symmetric Datalog, a syntactic restriction of linear Datalog and show that its expressive power is exactly that of restricted symmetric monotone Krom SNP. The deep re...
László Egri, Benoit Larose, Pascal T...