Sciweavers

1548 search results - page 176 / 310
» Computational Approaches to Sentence Completion
Sort
View
ICDCS
2008
IEEE
14 years 3 months ago
Hotness-Aware Sensor Networks
In a realistic sensor network, in particular with a nonuniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are...
Dong Li, Yanmin Zhu, Li Cui, Lionel M. Ni
ICNS
2008
IEEE
14 years 3 months ago
Performance Study of PANA Pre-authentication for Interdomain Handover
—To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuo...
Patryk Chamuczynski, Omar Alfandi, Constantin Wern...
WETICE
2008
IEEE
14 years 3 months ago
Decentralized Network Analysis: A Proposal
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...
Alberto Montresor
MIR
2006
ACM
178views Multimedia» more  MIR 2006»
14 years 2 months ago
Dual diffusion model of spreading activation for content-based image retrieval
This paper introduces a content-based information retrieval method inspired by the ideas of spreading activation models. In response to a given query, the proposed approach comput...
Serhiy Kosinov, Stéphane Marchand-Maillet, ...
ICDCS
2005
IEEE
14 years 2 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake