Sciweavers

1995 search results - page 315 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
173
Voted
ADHOCNOW
2004
Springer
15 years 8 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
148
Voted
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
16 years 3 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
114
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
119
Voted
SIGUCCS
2000
ACM
15 years 7 months ago
Automating Residence Hall Internet Signups
As colleges and universities are moving into the realm of providing Internet connections to the residence dormitories (ResNet), the local help desk is becoming the focal point for...
John R. Miller, Tom Peterson
146
Voted
CA
1998
IEEE
15 years 7 months ago
Real-Time Facial Animation based upon a Bank of 3D Facial Expressions
The importance of faces in human interaction explains the desire for synthetic faces as a communication vehicle in computer graphics. Unfortunately, animating a face is a very com...
C. Kouadio, Pierre Poulin, P. Lachapelle