Sciweavers

5234 search results - page 962 / 1047
» Simulation of Computer Network Attacks
Sort
View
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 9 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
CCGRID
2007
IEEE
15 years 9 months ago
Study of Different Replica Placement and Maintenance Strategies in Data Grid
Data replication is an excellent technique to move and cache data close to users. By replication, data access performance can be improved dramatically. One of the challenges in da...
Rashedur M. Rahman, Ken Barker, Reda Alhajj
IPPS
2007
IEEE
15 years 9 months ago
Almost Peer-to-Peer Clock Synchronization
In this paper, an almost peer-to-peer (AP2P) clock synchronization protocol is proposed. AP2P is almost peer-topeer in the sense that it provides the desirable features of a purel...
Ahmed Sobeih, Michel Hack, Zhen Liu, Li Zhang
IPPS
2007
IEEE
15 years 9 months ago
A Minimal Access Cost-Based Multimedia Object Replacement Algorithm
Multimedia object caching, by which the same multimedia object can be adapted to diverse mobile appliances through the technique of transcoding, is an important technology for imp...
Keqiu Li, Takashi Nanya, Wenyu Qu
HIPC
2007
Springer
15 years 9 months ago
Distributed Ranked Search
P2P deployments are a natural infrastructure for building distributed search networks. Proposed systems support locating and retrieving all results, but lack the information necess...
Vijay Gopalakrishnan, Ruggero Morselli, Bobby Bhat...