Sciweavers

1368 search results - page 122 / 274
» Perfect Local Computability and Computable Simulations
Sort
View
124
Voted
AINA
2008
IEEE
15 years 10 months ago
Optimal Resource Discovery Paths of Gnutella2
This paper shows that the performance of peer-to-peer resource discovery algorithms is upper bounded by a k-Steiner minimum tree and proposes an algorithm locating near-optimal qu...
Mikko Vapa, Annemari Auvinen, Yevgeniy Ivanchenko,...
145
Voted
SKG
2006
IEEE
15 years 9 months ago
IAC: Interest-Aware Caching for Unstructured P2P
The simplicity and robustness of unstructured P2P system make it a preferable architecture for constructing real large scale file sharing system. Most of the existing paradigms re...
Xucheng Luo, Zhiguang Qin, Ji Geng, Jiaqing Luo
142
Voted
CCS
2008
ACM
15 years 5 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
117
Voted
BMVC
2010
15 years 1 months ago
Histogram of Oriented Cameras - A New Descriptor for Visual SLAM in Dynamic Environments
Simultaneous localization and mapping (SLAM) is a basic prerequisite in autonomous mobile robotics. Most existing visual SLAM approaches either assume a static environment, or sim...
Katrin Pirker
ICASSP
2008
IEEE
15 years 10 months ago
Avoiding divergence in the constant modulus algorithm
One of the most popular algorithms for blind equalization is the Constant Modulus Algorithm (CMA), due to its simplicity and low computational cost. However, if the step-size is n...
Maria D. Miranda, M. T. M. Silva, Vitor H. Nascime...