Sciweavers

1723 search results - page 286 / 345
» Predicting the Performance of IDA* using Conditional Distrib...
Sort
View
WWW
2003
ACM
16 years 4 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
SIGCOMM
2010
ACM
15 years 4 months ago
Topology-aware resource allocation for data-intensive workloads
This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the ho...
Gunho Lee, Niraj Tolia, Parthasarathy Ranganathan,...
MSWIM
2009
ACM
15 years 10 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
MOBISYS
2007
ACM
16 years 3 months ago
Vehicular opportunistic communication under the microscope
We consider the problem of providing vehicular Internet access using roadside 802.11 access points. We build on previous work in this area [18, 8, 5, 11] with an extensive experim...
David Hadaller, Srinivasan Keshav, Tim Brecht, Shu...
CISS
2007
IEEE
15 years 10 months ago
Emitter Localization and Visualization (ELVIS): A Backward Ray Tracing Algorithm for Locating Emitters
— We present ELVIS, a new approach for localizing a first responder (e.g., firefighter) inside a building. We assume that the first responder emits RF energy, which undergoes...
Aliye Özge Kaya, Larry J. Greenstein, Dmitry ...