Sciweavers

5079 search results - page 947 / 1016
» Hidden-Action in Network Routing
Sort
View
WEBDB
2005
Springer
129views Database» more  WEBDB 2005»
15 years 3 months ago
Processing Top-N Queries in P2P-based Web Integration Systems with Probabilistic Guarantees
Efficient query processing in P2P-based Web integration systems poses a variety of challenges resulting from the strict decentralization and limited knowledge. As a special probl...
Katja Hose, Marcel Karnstedt, Kai-Uwe Sattler, Dan...
IWDW
2004
Springer
15 years 3 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
VOSS
2004
Springer
135views Mathematics» more  VOSS 2004»
15 years 3 months ago
Analysing Randomized Distributed Algorithms
Abstract. Randomization is of paramount importance in practical applications and randomized algorithms are used widely, for example in co-ordinating distributed computer networks, ...
Gethin Norman
INFOCOM
2003
IEEE
15 years 3 months ago
Improved BGP Convergence via Ghost Flushing
— In [1], [2] it was noticed that sometimes it takes BGP a substantial amount of time and messages to converge and stabilize following the failure of some node in the Internet. I...
Anat Bremler-Barr, Yehuda Afek, Shemer Schwarz
IPTPS
2003
Springer
15 years 3 months ago
SOMO: Self-Organized Metadata Overlay for Resource Management in P2P DHT
– In this paper, we first describe the concept of data overlay, which is a mechanism to implement arbitrary data structure on top of any structured P2P DHT. With this ion, we dev...
Zheng Zhang, Shuming Shi, Jing Zhu