Sciweavers

14347 search results - page 2559 / 2870
» Interactive Granular Computing
Sort
View
151
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 10 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
P2P
2007
IEEE
146views Communications» more  P2P 2007»
15 years 10 months ago
Modelling Real P2P Networks: The Effect of Altruism
We develop a model of the interaction of rational peers in an incentive-free Peer-to-Peer (P2P) network and use game theoretic analysis to derive results about peer and network be...
Dimitrios K. Vassilakis, Vasilis Vassalos
85
Voted
ROMAN
2007
IEEE
129views Robotics» more  ROMAN 2007»
15 years 10 months ago
Is The Uncanny Valley An Uncanny Cliff?
— The uncanny valley theory proposed by Mori in 1970 has been a hot topic in human robot interaction research, in particular since the development of increasingly human-like andr...
Christoph Bartneck, Takayuki Kanda, Hiroshi Ishigu...
ROBOCOMM
2007
IEEE
15 years 10 months ago
Autonomous navigation of wireless robot swarms with covert leaders
— The integration of advanced computation, wireless communication, and control technologies has facilitated the creation of autonomous robot swarms for many civil and military ap...
Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen
SAINT
2007
IEEE
15 years 10 months ago
SPICE: Evolving IMS to Next Generation Service Platforms
Today's wireless and mobile services are typically monolithic and often centralized in nature, which limits heterogeneous service access and shared service usage. New sources...
Sasu Tarkoma, Christian Prehofer, Anna V. Zhdanova...
« Prev « First page 2559 / 2870 Last » Next »