Sciweavers

23589 search results - page 4509 / 4718
» Uncheatable Distributed Computations
Sort
View
SASN
2003
ACM
15 years 7 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
SIGECOM
2003
ACM
135views ECommerce» more  SIGECOM 2003»
15 years 7 months ago
Playing large games using simple strategies
We prove the existence of -Nash equilibrium strategies with support logarithmic in the number of pure strategies. We also show that the payoffs to all players in any (exact) Nash...
Richard J. Lipton, Evangelos Markakis, Aranyak Meh...
SIGIR
2003
ACM
15 years 7 months ago
Domain-independent text segmentation using anisotropic diffusion and dynamic programming
This paper presents a novel domain-independent text segmentation method, which identifies the boundaries of topic changes in long text documents and/or text streams. The method c...
Xiang Ji, Hongyuan Zha
SLIP
2003
ACM
15 years 7 months ago
Perimeter-degree: a priori metric for directly measuring and homogenizing interconnection complexity in multilevel placement
In this paper, we describe an accurate metric (perimeter-degree) for measuring interconnection complexity and effective use of it for controlling congestion in a multilevel framew...
Navaratnasothie Selvakkumaran, Phiroze N. Parakh, ...
VRML
2003
ACM
15 years 7 months ago
A multi-user virtual environment system with extensible animations
Multi-user virtual environment (MUVE) systems integrate the technologies of virtual reality and distributed system to allow users to interact with each other in a realistic virtua...
Yi-Lin Liu, Tsai-Yen Li
« Prev « First page 4509 / 4718 Last » Next »