Search Results for ''

published presentations and documents on DocSlides.

A Scalable Content-Addressable Network
A Scalable Content-Addressable Network
by jane-oiler
Sylvia . Ratnasamy. , Paul Francis, Mark Handley,...
A Non-Local Cost Aggregation Method for Stereo Matching
A Non-Local Cost Aggregation Method for Stereo Matching
by calandra-battersby
Yang, . QingXiong. (. 杨庆雄. ). City Univers...
SEP: A
SEP: A
by danika-pritchard
Stable Election Protocol for . clustered heteroge...
Synthesis with the Sketch System
Synthesis with the Sketch System
by yoshiko-marsland
Day 3. Armando Solar-. Lezama. In place list reve...
Energy-aware
Energy-aware
by jane-oiler
Hierarchical Scheduling of. Applications in Large...
Dynamo:
Dynamo:
by jane-oiler
Amazon’s Highly Available Key-Value Store. Pres...
Amazon’s Key-Value Store: Dynamo
Amazon’s Key-Value Store: Dynamo
by phoebe-click
DeCandia,Hastorun,Jampani. , . Kakulapati. , . La...
Elixir
Elixir
by min-jolicoeur
: A System for Synthesizing Concurrent Graph Pro...
Graph Data Mining with Map-Reduce
Graph Data Mining with Map-Reduce
by liane-varnes
Nima Sarshar, Ph.D.. INTUIT . Inc. ,. Nima_sarsha...
Rumors
Rumors
by liane-varnes
, consensus and epidemics on networks. J. . Ganes...
Design of a
Design of a
by luanne-stotts
distributed . energy efficient clustering (DEEC) ...
FAWN: Fast Array of Wimpy Nodes
FAWN: Fast Array of Wimpy Nodes
by lindy-dunigan
A technical paper presentation in fulfillment of ...
EE 441
EE 441
by ellena-manuel
Some example projects. Singular Value Decompositi...
Multicast Communication
Multicast Communication
by debby-jeon
Multicast. . is the delivery of a message . to ....
SUSTAIN: An Adaptive Fault Tolerance
SUSTAIN: An Adaptive Fault Tolerance
by olivia-moreira
Service . for Geographically . Overlapping Wirele...
EECS 262a
EECS 262a
by trish-goza
Advanced Topics in Computer Systems. Lecture . 22...
Harikrishnan Karunakaran
Harikrishnan Karunakaran
by celsa-spraggs
Sulabha Balan. Keyword Searching and Browsing in...
Counter-measuring MAC Misbehaviors
Counter-measuring MAC Misbehaviors
by danika-pritchard
in Ad Hoc Networks using Game Theory. March . 25,...
Map-Reduce Graph Processing
Map-Reduce Graph Processing
by karlyn-bohler
Adapted from UMD Jimmy Lin’s slides, which . is...
Topic 1: Sensor Networks
Topic 1: Sensor Networks
by briana-ranney
(Long Lecture). Jorge J. Gómez. Trickle: A Self-...
Graphs - II
Graphs - II
by lois-ondreau
CS 2110, Spring 2015. Where did I leave that book...
On the Node Clone Detection
On the Node Clone Detection
by kittie-lecroy
inWireless. Sensor Networks. Abstract. Wireless s...
Effects of adding Arbitrary Physical Nodes to a Mobile Ad-H
Effects of adding Arbitrary Physical Nodes to a Mobile Ad-H
by phoebe-click
By . Ian Cavitt. Arbitrary Physical Node. Essenti...
On Survivability of Mobile Cyber Physical Systems
On Survivability of Mobile Cyber Physical Systems
by min-jolicoeur
with Intrusion . Detection. 1. Presented by: Ting...
Graph Traversal Algorithms
Graph Traversal Algorithms
by pasty-toler
*Depth-First-Search(DFS). *Breadth-first-search(B...
Network Measures
Network Measures
by alida-meadow
TJTSD66: Advanced Topics in Social Media. Dr. WAN...
Attacks and Counter Defense Mechanisms for Cyber-Physical S
Attacks and Counter Defense Mechanisms for Cyber-Physical S
by pasty-toler
1. Taha Hassan. Lulu Wang. CS 5214 Fall 2015. Ove...
Axillary Lymph Node Surgery
Axillary Lymph Node Surgery
by thomas
YourLymphatic SystemUnderstanding how your lymphat...
Sentinel Lymph Node Biopsy for Melanoma
Sentinel Lymph Node Biopsy for Melanoma
by oconnor
1 (for Dr. Young) Sentinel Lymph Node Biopsy for M...
Multi Node Label Routing – A layer 2.5 routing protocol
Multi Node Label Routing – A layer 2.5 routing protocol
by briana-ranney
Addressing routing scalability issues. NSF Ignite...
Node Similarity, Graph Similarity and Matching:
Node Similarity, Graph Similarity and Matching:
by briana-ranney
Theory and Applications. Danai Koutra (CMU). Tina...
FAWN: A FAST ARRAY OF WIMPY NODES
FAWN: A FAST ARRAY OF WIMPY NODES
by sophia
. D. G. Andersen. 1. , J. Franklin. 1. , M. Kami...
Chapter 21: Parallel and Distributed Storage
Chapter 21: Parallel and Distributed Storage
by brooke
Introduction. Parallel machines have become quite ...
Which sectors can accelerate the pull of the Tunisian economy out of the recession?
Which sectors can accelerate the pull of the Tunisian economy out of the recession?
by lucy
A network analysis approach. Ramzi Salem. 8. th. ...
1 k-anonymity in Graphs 2
1 k-anonymity in Graphs 2
by felicity
Methods based on k-anonymity. k-candidate. k-deg...
Lymphadenopathy Presented by :
Lymphadenopathy Presented by :
by dandy
Bhajneesh. Singh . Bedi. Objectives. Approach to ...
Fault Tolerance in Distributed Systems
Fault Tolerance in Distributed Systems
by arya
Jyoti Islam. Nagi. Reddy . Gatla. Venkatesh. . J...
Discussion of  Greedy Search, A*
Discussion of Greedy Search, A*
by taylor
and SMA*. Remark: SMA* will be covered by Group Ho...
Mining Social Network Graphs
Mining Social Network Graphs
by ella
Debapriyo Majumdar. Data Mining – Fall 2014. Ind...
General Tree Search Main variations:
General Tree Search Main variations:
by victoria
Which leaf node to expand next. Whether to check f...