1. Introduction -- 1. Introduction -- I. Peer-to-Peer: Notion, Areas, History and Future -- 2. What Is This “Peer-to-Peer” About? -- 3. Past and Future -- 4. Application Areas -- II. Unstructured Peer-to-Peer Systems -- 5. First and Second Generation of Peer-to-Peer Systems -- 6. Random Graphs, Small-Worlds and Scale-Free Networks -- III. Structured Peer-to-Peer Systems -- 7. Distributed Ha…
Color Analysis -- On Determining the Color of the Illuminant Using the Dichromatic Reflection Model -- Probabilistic Color Optical Flow -- Illumination Invariant Color Texture Analysis Based on Sum- and Difference-Histograms -- Color Image Compression: Early Vision and the Multiresolution Representations -- Stereo Vision -- Optic Flow Goes Stereo: A Variational Method for Estimating Discontinui…
On Evaluating the Performance of Security Protocols -- Timed Equivalences for Timed Event Structures -- Similarity of Generalized Resources in Petri Nets -- Real-Time Event Structures and Scott Domains -- Early-Stopping k-Set Agreement in Synchronous Systems Prone to Any Number of Process Crashes -- Allowing Atomic Objects to Coexist with Sequentially Consistent Objects -- An Approach to the Im…
Workshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005) -- Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments -- On Building and Updating Distributed LSI for P2P Systems -- Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network -- Characterization of P2P File-Sharing System -- Analys…
Keynote Speech -- Session 1A: Parallel Algorithms and Systems I -- Session 1B: Data Mining and Management -- Session 1C: Distributed Algorithms and Systems -- Session 2A: Fault Tolerance Protocols and Systems -- Session 2B: Sensor Networks and Protocols -- Session 2C: Cluster Systems and Applications -- Session 3A: Parallel Algorithms and Systems II -- Session 3B: Grid Applications and Systems …
Keynote Speech -- Tutorial -- Session 1A: Cluster Systems and Applications -- Session 1B: Performance Evaluation and Measurements -- Session 1C: Distributed Algorithms and Systems -- Session 1D: Fault Tolerance and Reliability -- Session 2A: High-Performance Computing and Architecture I -- Session 2B: Parallel Algorithms and Systems I -- Session 2C: Network Routing and Communication Algorithms …
Probabilistic and Informational Approaches -- Adaptive Simulated Annealing for Energy Minimization Problem in a Marked Point Process Application -- A Computational Approach to Fisher Information Geometry with Applications to Image Analysis -- Optimizing the Cauchy-Schwarz PDF Distance for Information Theoretic, Non-parametric Clustering -- Concurrent Stereo Matching: An Image Noise-Driven Model…
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, provid…
Dynamic-Fuzzy Concepts -- Conceptual Modeling of Knowledge-Based Systems using UML -- Translating Ontologies to Default Logic -- Designing Cooperative Embedded Systems using a Multiagent Approach -- Modeling Multi-Agent Systems with Hierarchical Colored Petri Nets -- Translating Ontologies to Default Logic -- Semantic Network and Concept Mapping -- A Hybrid Ant-Based Clustering Algorithm -- Iri…