Sciweavers

206 search results - page 35 / 42
» A Routing Mechanism Based on Social Networks and Betweenness...
Sort
View
COMCOM
2008
99views more  COMCOM 2008»
13 years 10 months ago
Efficiently reconfigurable backbones for wireless sensor networks
We present the definition and performance evaluation of a protocol for building and maintaining a connected backbone among the nodes of a wireless sensor networks (WSN). Building ...
Stefano Basagni, Chiara Petrioli, Roberto Petrocci...
ACSAC
2004
IEEE
14 years 2 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
CDVE
2008
Springer
191views Visualization» more  CDVE 2008»
14 years 11 days ago
Applying Web 2.0 Design Principles in the Design of Cooperative Applications
Abstract. "Web 2.0" is a term frequently mentioned in media - apparently, applications such as Wikipedia, Social Network Services, Online Shops with integrated recommende...
Niels Pinkwart
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 10 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
INFOCOM
2010
IEEE
13 years 8 months ago
Surfing the Blogosphere: Optimal Personalized Strategies for Searching the Web
We propose a distributed mechanism for finding websurfing strategies that is inspired by the StumbleUpon recommendation engine. Each day, a websurfer visits a sequence of websites ...
Stratis Ioannidis, Laurent Massoulié