Sciweavers

1583 search results - page 142 / 317
» The Quorum Deployment Problem
Sort
View
129
Voted
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech
IPPS
2005
IEEE
15 years 9 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
133
Voted
AIED
2005
Springer
15 years 9 months ago
The Assistment Builder: A Rapid Development Tool for ITS
Intelligent Tutoring Systems are notoriously costly to construct [1], and require PhD level experience in cognitive science and rule based programming. The goal of this research wa...
Terrence E. Turner, Michael A. Macasek, Goss Nuzzo...
ICN
2005
Springer
15 years 9 months ago
AIMD Penalty Shaper to Enforce Assured Service for TCP Flows
Abstract. Many studies explored the guaranteed TCP throughput problem in DiffServ networks. Several new marking schemes have been proposed in order to solve this problem. Even if ...
Emmanuel Lochin, Pascal Anelli, Serge Fdida
IWPEC
2004
Springer
15 years 8 months ago
Chordless Paths Through Three Vertices
Consider the following problem, that we call “Chordless Path through Three Vertices” or CP3V, for short: Given a simple undirected graph G = (V, E), a positive integer k, and t...
Robert Haas, Michael Hoffmann