Sciweavers

539 search results - page 95 / 108
» Resource Adaptive Distributed Information Sharing
Sort
View
CCR
2007
119views more  CCR 2007»
14 years 9 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
CHIMIT
2007
ACM
15 years 1 months ago
Network-centricity: hindered by hierarchical anchors
Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibil...
Steve Abrams, Gloria Mark
ICCV
2009
IEEE
16 years 2 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
CEC
2008
IEEE
15 years 4 months ago
Natural Evolution Strategies
— This paper presents Natural Evolution Strategies (NES), a novel algorithm for performing real-valued ‘black box’ function optimization: optimizing an unknown objective func...
Daan Wierstra, Tom Schaul, Jan Peters, Jürgen...
CAISE
2003
Springer
15 years 2 months ago
OMNIX: A Topology-Independent P2P Middleware
Peer-to-Peer (P2P) computing has been increasingly gaining interest. P2P architectures are no longer just used for sharing music files over the InP2P middleware systems attempt to...
Roman Kurmanowytsch, Engin Kirda, Clemens Kerer, S...