Sciweavers

738 search results - page 112 / 148
» Comparison of Approaches to Service Deployment
Sort
View
AH
2004
Springer
14 years 2 months ago
Machine Learning Methods for One-Session Ahead Prediction of Accesses to Page Categories
This paper presents a comparison among several well-known machine learning techniques when they are used to carry out a one-session ahead prediction of page categories. We use reco...
José David Martín-Guerrero, Emili Ba...
WWCA
1998
Springer
14 years 26 days ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
ARCS
2006
Springer
14 years 13 days ago
Background Data Acquisition and Carrying: The BlueDACS Project
As an alternative to ad hoc wireless sensor networks, we propose to utilize the mobile devices that are carried by people who walk along the site on which the sensors are deployed....
Thomas Wieland, Martin Fenne, Benjamin Stöcke...
AUTONOMICS
2008
ACM
13 years 10 months ago
QoS-aware ant routing with colored pheromones in wireless mesh networks
Inspired by the collective foraging behavior of specific ant species, ant-based routing algorithms are able to find optimal or near optimal packet routes for Wireless Mesh Network...
Martina Umlauft, Wilfried Elmenreich
TDP
2010
189views more  TDP 2010»
13 years 3 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...