<--- Back to Details
First PageDocument Content
File sharing networks / LOCKSS / Peer-to-peer / Opinion poll / Consensus / Communications protocol / Adversary model / Statistics / Computing / Data
Date: 2009-06-17 14:01:10
File sharing networks
LOCKSS
Peer-to-peer
Opinion poll
Consensus
Communications protocol
Adversary model
Statistics
Computing
Data

SOSP2003.dvi

Add to Reading List

Source URL: web.cs.dal.ca

Download Document from Source Website

File Size: 328,39 KB

Share Document on Facebook

Similar Documents

Online algorithms / Analysis of algorithms / Computer science / Applied mathematics / Computer programming / K-server problem / Metrical task system / Adversary model / Competitive analysis / List update problem / Algorithm / Randomized algorithm

Competitive Online Algorithms Susanne Albers Overview arrive one by one and must be scheduled immediately

DocID: 1ri9G - View Document

Analysis of algorithms / Academia / Online algorithms / Computer science / Probabilistic complexity theory / Randomized algorithm / Adversary model / Algorithm / Data binning / Labeling theory / Mathematics

Charles University in Prague Faculty of Mathematics and Physics DOCTORAL THESIS Jan Bul“anek

DocID: 1r6w8 - View Document

Online algorithms / Analysis of algorithms / Computer science / Applied mathematics / Mathematics / Competitive analysis / Cache replacement policies / List update problem / Algorithm / K-server problem / Time complexity / Adversary model

Online Algorithms: A Study of Graph-Theoretic Concepts Susanne Albers Max-Planck-Institut fur Informatik, Im Stadtwald, 66123 Saarbrucken, Germany. , http://www.mpi-sb.mpg.de/~ albers/

DocID: 1r4RN - View Document

Road traffic management / Mathematical physics / Road transport / Law / Privacy / Adversary model / Traffic flow / Internet privacy / Applied mathematics / Business / Academia

C:/Users/Bin Zan/Dropbox/typeinst/IEEE6page.dvi

DocID: 1qYAD - View Document

Technology / Electronics / Electromagnetism / Computer networking / Sensor node / Wireless sensor network / Signal-to-interference-plus-noise ratio / Radar / Adversary model / Beamforming / Computer network / Throughput

The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

DocID: 1qr3M - View Document