Sciweavers

491 search results - page 65 / 99
» Adaptive Networks of Smart Objects
Sort
View
DSN
2004
IEEE
13 years 11 months ago
Checkpointing of Control Structures in Main Memory Database Systems
This paper proposes an application-transparent, low-overhead checkpointing strategy for maintaining consistency of control structures in a commercial main memory database (MMDB) sy...
Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iye...
CIDM
2007
IEEE
14 years 2 months ago
Structure Prediction in Temporal Networks using Frequent Subgraphs
— There are several types of processes which can be modeled explicitly by recording the interactions between a set of actors over time. In such applications, a common objective i...
Mayank Lahiri, Tanya Y. Berger-Wolf
CCS
2010
ACM
13 years 6 months ago
PriMa: an effective privacy protection mechanism for social networks
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
COMCOM
2006
93views more  COMCOM 2006»
13 years 8 months ago
A novel method for QoS provisioning with protection in GMPLS networks
In this paper, a new optimal policy is introduced to determine, adapt, and protect the Generalized MultiProtocol Label Switching (GMPLS) network topology based on the current traf...
Tricha Anjali, Caterina M. Scoglio
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 2 months ago
Application-Aware Topology Formation Algorithm for Peer-to-Peer Networks
—When constructing an unstructured P2P topology, one should consider the application running on top of it in order to achieve a good performance for the whole P2P system. It is n...
Kin Wah Kwong, Danny H. K. Tsang