Sciweavers

2136 search results - page 408 / 428
» Distributed algorithms for connected domination in wireless ...
Sort
View
CN
2007
137views more  CN 2007»
13 years 7 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
SIGCOMM
2009
ACM
14 years 2 months ago
BCube: a high performance, server-centric network architecture for modular data centers
This paper presents BCube, a new network architecture specifically designed for shipping-container based, modular data centers. At the core of the BCube architecture is its serve...
Chuanxiong Guo, Guohan Lu, Dan Li, Haitao Wu, Xuan...
CIKM
2009
Springer
14 years 2 months ago
Personalized social search based on the user's social network
This work investigates personalized social search based on the user’s social relations – search results are re-ranked according to their relations with individuals in the user...
David Carmel, Naama Zwerdling, Ido Guy, Shila Ofek...
GIS
2002
ACM
13 years 7 months ago
A road network embedding technique for k-nearest neighbor search in moving object databases
A very important class of queries in GIS applications is the class of K-Nearest Neighbor queries. Most of the current studies on the K-Nearest Neighbor queries utilize spatial ind...
Cyrus Shahabi, Mohammad R. Kolahdouzan, Mehdi Shar...
NIPS
2004
13 years 9 months ago
Maximising Sensitivity in a Spiking Network
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...
Anthony J. Bell, Lucas C. Parra