Sciweavers

1893 search results - page 229 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
ADHOCNOW
2004
Springer
14 years 1 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
ADHOC
2007
144views more  ADHOC 2007»
13 years 8 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
CN
2006
100views more  CN 2006»
13 years 8 months ago
Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds
We consider how to construct and maintain a structured overlay P2P network based on the small-world paradigm. Two main attractive properties of a small-world network are (1) a low...
Ken Y. K. Hui, John C. S. Lui, David K. Y. Yau
MOBIHOC
2009
ACM
14 years 8 months ago
3DLS: density-driven data location service for mobile ad-hoc networks
Finding data items is one of the most basic services of any distributed system. It is particular challenging in ad-hoc networks, due to their inherent decentralized nature and lac...
Roy Friedman, Noam Mori
TCBB
2010
80views more  TCBB 2010»
13 years 6 months ago
On the Importance of Comprehensible Classification Models for Protein Function Prediction
—The literature on protein function prediction is currently dominated by works aimed at maximizing predictive accuracy, ignoring the important issues of validation and interpreta...
Alex Alves Freitas, Daniela Wieser, Rolf Apweiler