Sciweavers

5722 search results - page 890 / 1145
» Security Function Interactions
Sort
View
IPTPS
2004
Springer
15 years 9 months ago
Uncoordinated Load Balancing and Congestion Games in P2P Systems
In P2P systems, users often have many choices of peers from whom to download their data. Each user cares primarily about its own response time, which depends on how many other use...
Subhash Suri, Csaba D. Tóth, Yunhong Zhou
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 9 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 9 months ago
Evolution of a Knowledge Focused Computer Supported Learning System by Ensuring Extensibility through Generalization and Replica
If sufficient attention is not paid to the information models on which Learning Platforms are based the ability to deliver rich functionality is hindered. This paper describes the...
David White, Lesley A. Gardner, Don Sheridan
SIGGRAPH
2003
ACM
15 years 9 months ago
TensorTextures
This paper introduces a tensor framework for image-based rendering. In particular, we develop an algorithm called TensorTextures that learns a parsimonious model of the bidirectio...
M. Alex O. Vasilescu, Demetri Terzopoulos
ICSE
2003
IEEE-ACM
15 years 9 months ago
Multi-view Software Component Modeling for Dependability
Modeling software components from multiple perspectives provides complementary views of a software system and enables sophisticated analyses of its functionality. A software compon...
Roshanak Roshandel, Nenad Medvidovic