Sciweavers

2645 search results - page 529 / 529
» time 2003
Sort
View
80
Voted
SOSP
2003
ACM
15 years 7 months ago
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet traffic. This paper probes deeply into modern P2P file sharing systems and the forces that...
P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu...
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
15 years 3 months ago
Localized construction of bounded degree and planar spanner for wireless ad hoc networks
We propose a novel localized algorithm that constructs a bounded degree and planar spanner for wireless ad hoc networks modeled by unit disk graph (UDG). Every node only has to kn...
Yu Wang 0003, Xiang-Yang Li
ASIACRYPT
2003
Springer
15 years 3 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
FIMH
2003
Springer
15 years 3 months ago
A Levelset Based Method for Segmenting the Heart in 3D+T Gated SPECT Images
Keywords Levelset methods were introduced in medical images segmentation by Malladi et al in 1995. In this paper, we propose several improvements of the original method to speed u...
Arnaud Charnoz, Diane Lingrand, Johan Montagnat
111
Voted
AAAI
2008
15 years 16 days ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...