Sciweavers

13752 search results - page 2548 / 2751
» Parallel and Distributed Haskells
Sort
View
ICDCSW
2006
IEEE
15 years 10 months ago
Evaluation of Unstructured Overlay Maintenance Protocols under Churn
An overlay network is formed on top of – and generally independently from – the underlying physical computer network, by the peers (nodes) of a P2P system. The dynamics of pee...
Roberto Baldoni, Silvia Bonomi, Adriano Rippa, Leo...
ICDCSW
2006
IEEE
15 years 10 months ago
Dimension-Based Subscription Pruning for Publish/Subscribe Systems
Subscription pruning has been proven as valuable routing optimization for Boolean subscriptions in publish/subscribe systems. It aims at optimizing subscriptions independently of ...
Sven Bittner, Annika Hinze
ICDCSW
2006
IEEE
15 years 10 months ago
Improve Searching by Reinforcement Learning in Unstructured P2Ps
— Existing searching schemes in unstructured P2Ps can be categorized as either blind or informed. The quality of query results in blind schemes is low. Informed schemes use simpl...
Xiuqi Li, Jie Wu
ICDCSW
2006
IEEE
15 years 10 months ago
Fuzzy Trust for Peer-to-Peer Systems
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
Nathan Griffiths, Kuo-Ming Chao, Muhammad Younas
ICDCSW
2006
IEEE
15 years 10 months ago
The Key Knob
Locks are mechanical fastening devices used on various kinds of objects like doors and vehicles, and they can be released using a certain type of key. They have a long history, fr...
Alois Ferscha, Clemens Holzmann, Stefan Resmerita
« Prev « First page 2548 / 2751 Last » Next »