Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
A Scalable Content-Addressable Network
by jane-oiler
Sylvia . Ratnasamy. , Paul Francis, Mark Handley,...
A Non-Local Cost Aggregation Method for Stereo Matching
by calandra-battersby
Yang, . QingXiong. (. 杨庆雄. ). City Univers...
SEP: A
by danika-pritchard
Stable Election Protocol for . clustered heteroge...
Synthesis with the Sketch System
by yoshiko-marsland
Day 3. Armando Solar-. Lezama. In place list reve...
Energy-aware
by jane-oiler
Hierarchical Scheduling of. Applications in Large...
Dynamo:
by jane-oiler
Amazon’s Highly Available Key-Value Store. Pres...
Amazon’s Key-Value Store: Dynamo
by phoebe-click
DeCandia,Hastorun,Jampani. , . Kakulapati. , . La...
Elixir
by min-jolicoeur
: A System for Synthesizing Concurrent Graph Pro...
Graph Data Mining with Map-Reduce
by liane-varnes
Nima Sarshar, Ph.D.. INTUIT . Inc. ,. Nima_sarsha...
Rumors
by liane-varnes
, consensus and epidemics on networks. J. . Ganes...
Design of a
by luanne-stotts
distributed . energy efficient clustering (DEEC) ...
FAWN: Fast Array of Wimpy Nodes
by lindy-dunigan
A technical paper presentation in fulfillment of ...
EE 441
by ellena-manuel
Some example projects. Singular Value Decompositi...
Multicast Communication
by debby-jeon
Multicast. . is the delivery of a message . to ....
SUSTAIN: An Adaptive Fault Tolerance
by olivia-moreira
Service . for Geographically . Overlapping Wirele...
EECS 262a
by trish-goza
Advanced Topics in Computer Systems. Lecture . 22...
Harikrishnan Karunakaran
by celsa-spraggs
Sulabha Balan. Keyword Searching and Browsing in...
Counter-measuring MAC Misbehaviors
by danika-pritchard
in Ad Hoc Networks using Game Theory. March . 25,...
Map-Reduce Graph Processing
by karlyn-bohler
Adapted from UMD Jimmy Lin’s slides, which . is...
Topic 1: Sensor Networks
by briana-ranney
(Long Lecture). Jorge J. Gómez. Trickle: A Self-...
Graphs - II
by lois-ondreau
CS 2110, Spring 2015. Where did I leave that book...
On the Node Clone Detection
by kittie-lecroy
inWireless. Sensor Networks. Abstract. Wireless s...
Effects of adding Arbitrary Physical Nodes to a Mobile Ad-H
by phoebe-click
By . Ian Cavitt. Arbitrary Physical Node. Essenti...
On Survivability of Mobile Cyber Physical Systems
by min-jolicoeur
with Intrusion . Detection. 1. Presented by: Ting...
Graph Traversal Algorithms
by pasty-toler
*Depth-First-Search(DFS). *Breadth-first-search(B...
Network Measures
by alida-meadow
TJTSD66: Advanced Topics in Social Media. Dr. WAN...
Attacks and Counter Defense Mechanisms for Cyber-Physical S
by pasty-toler
1. Taha Hassan. Lulu Wang. CS 5214 Fall 2015. Ove...
Axillary Lymph Node Surgery
by thomas
YourLymphatic SystemUnderstanding how your lymphat...
Sentinel Lymph Node Biopsy for Melanoma
by oconnor
1 (for Dr. Young) Sentinel Lymph Node Biopsy for M...
Multi Node Label Routing – A layer 2.5 routing protocol
by briana-ranney
Addressing routing scalability issues. NSF Ignite...
Node Similarity, Graph Similarity and Matching:
by briana-ranney
Theory and Applications. Danai Koutra (CMU). Tina...
FAWN: A FAST ARRAY OF WIMPY NODES
by sophia
. D. G. Andersen. 1. , J. Franklin. 1. , M. Kami...
Chapter 21: Parallel and Distributed Storage
by brooke
Introduction. Parallel machines have become quite ...
Which sectors can accelerate the pull of the Tunisian economy out of the recession?
by lucy
A network analysis approach. Ramzi Salem. 8. th. ...
1 k-anonymity in Graphs 2
by felicity
Methods based on k-anonymity. k-candidate. k-deg...
Lymphadenopathy Presented by :
by dandy
Bhajneesh. Singh . Bedi. Objectives. Approach to ...
Fault Tolerance in Distributed Systems
by arya
Jyoti Islam. Nagi. Reddy . Gatla. Venkatesh. . J...
Discussion of Greedy Search, A*
by taylor
and SMA*. Remark: SMA* will be covered by Group Ho...
Mining Social Network Graphs
by ella
Debapriyo Majumdar. Data Mining – Fall 2014. Ind...
General Tree Search Main variations:
by victoria
Which leaf node to expand next. Whether to check f...
Load More...