Sciweavers

902 search results - page 88 / 181
» Opening Address
Sort
View
116
Voted
CAISE
2003
Springer
15 years 8 months ago
Processing Queries in a Large Peer-to-Peer System
While current search engines seem to easily handle the size of the data available on the Internet, they cannot provide fresh results. The most up-to-date data always resides on the...
Leonidas Galanis, Yuan Wang, Shawn R. Jeffery, Dav...
JSAC
2007
72views more  JSAC 2007»
15 years 3 months ago
Diverse: application-layer service differentiation in peer-to-peer communications
— The peer-to-peer communication paradigm, when used to disseminate bulk content or to stream real-time multimedia, has enjoyed the distinct advantage of scalability when compare...
Chuan Wu, Baochun Li
CHI
2010
ACM
15 years 1 months ago
A comparative evaluation on tree visualization methods for hierarchical structures with large fan-outs
Hierarchical structures with large fan-outs are hard to browse and understand. In the conventional node-link tree visualization, the screen quickly becomes overcrowded as users op...
Hyunjoo Song, Bo Hyoung Kim, Bongshin Lee, Jinwook...
JCIT
2010
172views more  JCIT 2010»
14 years 10 months ago
Conditional Sensor Deployment Using Evolutionary Algorithms
Sensor deployment is a critical issue, as it affects the cost and detection capabilities of a wireless sensor network. Although many previous efforts have addressed this issue, mo...
M. Sami Soliman, Guanzheng Tan
110
Voted
FOCS
2007
IEEE
15 years 9 months ago
Round Complexity of Authenticated Broadcast with a Dishonest Majority
Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...