Sciweavers

10633 search results - page 1703 / 2127
» Relating Distributed Objects
Sort
View
120
Voted
FC
2008
Springer
82views Cryptology» more  FC 2008»
15 years 5 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
165
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
Mining query logs to optimize index partitioning in parallel web search engines
Large-scale Parallel Web Search Engines (WSEs) needs to adopt a strategy for partitioning the inverted index among a set of parallel server nodes. In this paper we are interested ...
Claudio Lucchese, Salvatore Orlando, Raffaele Pere...
151
Voted
AAAI
2010
15 years 5 months ago
Bayesian Matrix Factorization with Side Information and Dirichlet Process Mixtures
Matrix factorization is a fundamental technique in machine learning that is applicable to collaborative filtering, information retrieval and many other areas. In collaborative fil...
Ian Porteous, Arthur Asuncion, Max Welling
158
Voted
DAGSTUHL
2010
15 years 5 months ago
Local and Global Illumination in the Volume Rendering Integral
This article is intended as an update of the major survey by Max [40] on optical models for direct volume rendering. It provides a brief overview of the subject scope covered by [...
Nelson Max, Min Chen
142
Voted
MASCOTS
2010
15 years 5 months ago
Content Delivery Using Replicated Digital Fountains
With a majority of Internet traffic being predicted to be caused by content delivery, it is clear that content delivery applications will consume much of the resources on the Inter...
Niklas Carlsson, Derek L. Eager
« Prev « First page 1703 / 2127 Last » Next »