Sciweavers

8493 search results - page 1517 / 1699
» Implementing a distributed firewall
Sort
View
MOBISYS
2010
ACM
15 years 6 months ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
AIMS
2008
Springer
15 years 6 months ago
Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
In distributed, dynamic networks and applications, such as Peer-to-Peer (P2P), users'behaviour and quality of service/quality of experiment1 are known to influence each other....
Julien Siebert, Vincent Chevrier, Laurent Ciarlett...
ATAL
2008
Springer
15 years 6 months ago
Mobile opportunistic commerce: mechanisms, architecture, and application
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
Ece Kamar, Eric Horvitz, Chris Meek
138
Voted
ATAL
2008
Springer
15 years 6 months ago
Strategyproof deterministic lotteries under broadcast communication
The design of deterministic and fair mechanisms for selection among a set of self-motivated agents based solely on these agents' input is a major challenge in multiagent syst...
Alon Altman, Moshe Tennenholtz
139
Voted
CCGRID
2008
IEEE
15 years 6 months ago
High Performance Relay Mechanism for MPI Communication Libraries Run on Multiple Private IP Address Clusters
We have been developing a Grid-enabled MPI communication library called GridMPI, which is designed to run on multiple clusters connected to a wide-area network. Some of these clust...
Ryousei Takano, Motohiko Matsuda, Tomohiro Kudoh, ...
« Prev « First page 1517 / 1699 Last » Next »