Sciweavers

1040 search results - page 111 / 208
» Resource Usage Verification
Sort
View
GW
2005
Springer
242views Biometrics» more  GW 2005»
15 years 8 months ago
Finger Tracking Methods Using EyesWeb
This paper compares different algorithms for tracking the position of fingers in a two-dimensional environment. Four algorithms have been implemented in EyesWeb, developed by DIS...
Anne-Marie Burns, Barbara Mazzarino
KIVS
2005
Springer
15 years 8 months ago
Token-Based Accounting for P2P-Systems
Abstract This paper presents a token-based accounting scheme for decentralized autonomous systems, such as peer-to-peer systems. The scheme uses tokens as proof of resource or serv...
Nicolas Liebau, Vasilios Darlagiannis, Andreas Mau...
MDM
2005
Springer
116views Communications» more  MDM 2005»
15 years 8 months ago
Data dissemination in mobile peer-to-peer networks
In this paper we propose adaptive content-driven routing and data dissemination algorithms for intelligently routing search queries in a peer-to-peer network that supports mobile ...
Thomas Repantis, Vana Kalogeraki
ICT
2004
Springer
128views Communications» more  ICT 2004»
15 years 8 months ago
SRBQ and RSVPRAgg: A Comparative Study
Abstract This paper presents a comparative evaluation of the Scalable ReservationBased QoS (SRBQ) and the RSVP Reservation Aggregation (RSVPRAgg) architectures, both designed to pr...
Rui Prior, Susana Sargento, Pedro Brandão, ...
HOTOS
2003
IEEE
15 years 8 months ago
High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two
Peer-to-peer storage aims to build large-scale, reliable and available storage from many small-scale unreliable, low-availability distributed hosts. Data redundancy is the key to ...
Charles Blake, Rodrigo Rodrigues