Results 1 - 10
of
11,705
ADDRESS MAPPINGS Internet Addresses
, 1981
"... This memo describes the relationship between address fields used in the Internet Protocol (IP) [1] and several specific networks. An internet address is a 32 bit quantity, with several codings as shown below. The first type (or class a) of address has a 7-bit network number and a 24-bit local addres ..."
Abstract
- Add to MetaCart
This memo describes the relationship between address fields used in the Internet Protocol (IP) [1] and several specific networks. An internet address is a 32 bit quantity, with several codings as shown below. The first type (or class a) of address has a 7-bit network number and a 24-bit local
ADDRESS MAPPINGS Internet Addresses
, 1981
"... This memo describes the relationship between address fields used in the Internet Protocol (IP) [1] and several specific networks. An internet address is a 32 bit quantity, with several codings as shown below. The first type (or class a) of address has a 7-bit network number and a 24-bit local addres ..."
Abstract
- Add to MetaCart
This memo describes the relationship between address fields used in the Internet Protocol (IP) [1] and several specific networks. An internet address is a 32 bit quantity, with several codings as shown below. The first type (or class a) of address has a 7-bit network number and a 24-bit local
ADDRESS MAPPINGS Internet Addresses
"... This memo describes the relationship between address fields used in the Internet Protocol (IP) [1] and several specific networks. An internet address is a 32 bit quantity, with several codings as shown below. The first type (or class a) of address has a 7-bit network number and a 24-bit local addres ..."
Abstract
- Add to MetaCart
This memo describes the relationship between address fields used in the Internet Protocol (IP) [1] and several specific networks. An internet address is a 32 bit quantity, with several codings as shown below. The first type (or class a) of address has a 7-bit network number and a 24-bit local
A Scalable Content-Addressable Network
- IN PROC. ACM SIGCOMM 2001
, 2001
"... Hash tables – which map “keys ” onto “values” – are an essential building block in modern software systems. We believe a similar functionality would be equally valuable to large distributed systems. In this paper, we introduce the concept of a Content-Addressable Network (CAN) as a distributed infra ..."
Abstract
-
Cited by 3371 (32 self)
- Add to MetaCart
Hash tables – which map “keys ” onto “values” – are an essential building block in modern software systems. We believe a similar functionality would be equally valuable to large distributed systems. In this paper, we introduce the concept of a Content-Addressable Network (CAN) as a distributed
A Probabilistic Approach to Concurrent Mapping and Localization for Mobile Robots
- Machine Learning
, 1998
"... . This paper addresses the problem of building large-scale geometric maps of indoor environments with mobile robots. It poses the map building problem as a constrained, probabilistic maximum-likelihood estimation problem. It then devises a practical algorithm for generating the most likely map from ..."
Abstract
-
Cited by 483 (43 self)
- Add to MetaCart
. This paper addresses the problem of building large-scale geometric maps of indoor environments with mobile robots. It poses the map building problem as a constrained, probabilistic maximum-likelihood estimation problem. It then devises a practical algorithm for generating the most likely map from
The design and implementation of an intentional naming system
- 17TH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '99) PUBLISHED AS OPERATING SYSTEMS REVIEW, 34(5):186--201, DEC. 1999
, 1999
"... This paper presents the design and implementation of the Intentional Naming System (INS), a resource discovery and service location system for dynamic and mobile networks of devices and computers. Such environments require a naming system that is (i) expressive, to describe and make requests based o ..."
Abstract
-
Cited by 518 (14 self)
- Add to MetaCart
.e., their intent), not where to find things (i.e., not hostnames). INS implements a late binding mechanism that integrates name resolution and message routing, enabling clients to continue communicating with end-nodes even if the name-to-address mappings change while a session is in progress. INS resolvers self
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
- ACM SIGCOMM
, 2001
"... A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto ..."
Abstract
-
Cited by 809 (15 self)
- Add to MetaCart
A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
- SIGCOMM'01
, 2001
"... A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto ..."
Abstract
-
Cited by 4469 (69 self)
- Add to MetaCart
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto
An integrative theory of prefrontal cortex function.
- Annual Review of Neuroscience,
, 2001
"... Abstract The prefrontal cortex has long been suspected to play an important role in cognitive control, in the ability to orchestrate thought and action in accordance with internal goals. Its neural basis, however, has remained a mystery. Here, we propose that cognitive control stems from the active ..."
Abstract
-
Cited by 1093 (20 self)
- Add to MetaCart
the active maintenance of patterns of activity in the prefrontal cortex that represent goals and the means to achieve them. They provide bias signals to other brain structures whose net effect is to guide the flow of activity along neural pathways that establish the proper mappings between inputs, internal
Protecting respondents’ identities in microdata release
- In IEEE Transactions on Knowledge and Data Engineering (TKDE
, 2001
"... Today’s globally networked society places great demand on the dissemination and sharing of information. While in the past released information was mostly in tabular and statistical form, many situations call today for the release of specific data (microdata). In order to protect the anonymity of the ..."
Abstract
-
Cited by 512 (32 self)
- Add to MetaCart
of the entities (called respondents) to which information refers, data holders often remove or encrypt explicit identifiers such as names, addresses, and phone numbers. De-identifying data, however, provides no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex
Results 1 - 10
of
11,705