Sciweavers

7921 search results - page 1466 / 1585
» LSH-preserving functions and their applications
Sort
View
INFOCOM
2007
IEEE
15 years 4 months ago
Optimal Provisioning of Elastic Service Availability
Abstract— Service availability is one of the most closely scrutinized metrics in offering network services. It is important to costeffectively provision a managed and differentia...
Dahai Xu, Ying Li, Mung Chiang, A. Robert Calderba...
IPPS
2007
IEEE
15 years 4 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
IRI
2007
IEEE
15 years 4 months ago
The Software Reuse Working Group: A Case Study in Fostering Reuse
Packaging software assets for reuse can improve the potential for others to adopt the software. Packaging the software with appropriate documentation and other resources can facil...
Ryan Gerard, Robert R. Downs, James J. Marshall, R...
IROS
2007
IEEE
198views Robotics» more  IROS 2007»
15 years 4 months ago
Cooperation of heterogeneous, autonomous robots: A case study of humanoid and wheeled robots
Abstract— In this paper we present a case study of cooperation of a strongly heterogeneous robot team, composed of a highly articulated humanoid robot and a wheeled robot with la...
Jutta Kiener, Oskar von Stryk
ISCA
2007
IEEE
168views Hardware» more  ISCA 2007»
15 years 4 months ago
Limiting the power consumption of main memory
The peak power consumption of hardware components affects their power supply, packaging, and cooling requirements. When the peak power consumption is high, the hardware components...
Bruno Diniz, Dorgival Olavo Guedes Neto, Wagner Me...
« Prev « First page 1466 / 1585 Last » Next »