Sciweavers

2664 search results - page 492 / 533
» The Many Faces of Agents
Sort
View
IPPS
2008
IEEE
15 years 6 months ago
Large-scale experiment of co-allocation strategies for Peer-to-Peer supercomputing in P2P-MPI
High Performance computing generally involves some parallel applications to be deployed on the multiples resources used for the computation. The problem of scheduling the applicat...
Stéphane Genaud, Choopan Rattanapoka
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 6 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 6 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 6 months ago
TCP HandOff: A Practical TCP Enhancement for Heterogeneous Mobile Environments
— In recent years, many different kinds of wireless access networks have been deployed for the Internet and have become inseparable parts of the Internet. But TCP, the most widel...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
ICDAR
2007
IEEE
15 years 6 months ago
Energy-Based Models in Document Recognition and Computer Vision
The Machine Learning and Pattern Recognition communities are facing two challenges: solving the normalization problem, and solving the deep learning problem. The normalization pro...
Yann LeCun, Sumit Chopra, Marc'Aurelio Ranzato, Fu...