Sciweavers

8125 search results - page 1398 / 1625
» Parallelism and evolutionary algorithms
Sort
View
ICDE
2005
IEEE
92views Database» more  ICDE 2005»
15 years 10 months ago
The Versioning System Balancing Data Amount and Access Frequency on Distributed Storage System
In this paper, a method of handling both access frequency skew and data amount skew on a distributed parallel storage system under version management system is discussed. We assum...
Mana Nakano, Dai Kobayashi, Akitsugu Watanabe, Tos...
ICPADS
2005
IEEE
15 years 10 months ago
Automated Discovery of Brand Piracy on the Internet
The Internet has become a key instrument for establishing and promoting product brands. Companies are very interested in detecting any misuse of their logos, plagiarism, grey impo...
Ulrich Pinsdorf, Peter Ebinger
ICPADS
2005
IEEE
15 years 10 months ago
MeshTree: Reliable Low Delay Degree-bounded Multicast Overlays
We study decentralised low delay degree-constrained overlay multicast tree construction for single source real-time applications. This optimisation problem is NP-hard even if comp...
Su-Wei Tan, A. Gill Waters, John S. Crawford
ICRA
2005
IEEE
259views Robotics» more  ICRA 2005»
15 years 10 months ago
Flexible Microscope Calibration using Virtual Pattern for 3-D Telemicromanipulation
Abstract— In the context of virtualized reality based telemicromanipulation, we present in this paper a visual calibration technique for optical microscope coupled with a CCD cam...
Mehdi Ammi, Vincent Frémont, Antoine Ferrei...
CONCUR
2005
Springer
15 years 10 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
« Prev « First page 1398 / 1625 Last » Next »