Sciweavers

1995 search results - page 315 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
ADHOCNOW
2004
Springer
14 years 1 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
14 years 8 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
SIGCOMM
2010
ACM
13 years 8 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
SIGUCCS
2000
ACM
14 years 2 days ago
Automating Residence Hall Internet Signups
As colleges and universities are moving into the realm of providing Internet connections to the residence dormitories (ResNet), the local help desk is becoming the focal point for...
John R. Miller, Tom Peterson
CA
1998
IEEE
14 years 7 min ago
Real-Time Facial Animation based upon a Bank of 3D Facial Expressions
The importance of faces in human interaction explains the desire for synthetic faces as a communication vehicle in computer graphics. Unfortunately, animating a face is a very com...
C. Kouadio, Pierre Poulin, P. Lachapelle