Sciweavers

4049 search results - page 655 / 810
» Neural Network Trainer through Computer Networks
Sort
View
PODS
2005
ACM
128views Database» more  PODS 2005»
16 years 3 months ago
Operator placement for in-network stream query processing
In sensor networks, data acquisition frequently takes place at lowcapability devices. The acquired data is then transmitted through a hierarchy of nodes having progressively incre...
Utkarsh Srivastava, Kamesh Munagala, Jennifer Wido...
117
Voted
PERCOM
2006
ACM
16 years 2 months ago
Analysing fundamental properties of marker-based vision system designs
This paper investigates fundamental properties of Marker-based Vision (MBV) systems. We present a theoretical analysis of the performance of basic tag designs which is extended th...
Andrew C. Rice, Robert K. Harle, Alastair R. Beres...
PAM
2009
Springer
15 years 10 months ago
Triangle Inequality and Routing Policy Violations in the Internet
Triangle inequality violations (TIVs) are the effect of packets between two nodes being routed on the longer direct path between them when a shorter detour path through an intermed...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
DSN
2009
IEEE
15 years 10 months ago
System log pre-processing to improve failure prediction
Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering ...
Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Gei...
DSN
2009
IEEE
15 years 10 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer