Sciweavers

2913 search results - page 154 / 583
» How Much to Copy
Sort
View
IMC
2005
ACM
14 years 4 months ago
An Information-theoretic Approach to Network Monitoring and Measurement
Network engineers and operators are faced with a number of challenges that arise in the context of network monitoring and measurement. These include: i) how much information is in...
Yong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysost...
GI
2004
Springer
14 years 4 months ago
Methodology for Estimating Network Distances of Gnutella Neighbors
Abstract: In this paper we ask the question how much does the neighborhood selection process of a P2P protocol such as Gnutella respect the underlying Internet topology.
Vinay Aggarwal, Stefan Bender, Anja Feldmann, Arne...
KES
2004
Springer
14 years 4 months ago
Classification of Fuzzy Data in Database Management System
When the available information is imperfect, it is often desirable to represent it in the database, so that it can be used to answer queries of interest as much as possible. The da...
Deval Popat, Hema Sharda, David Taniar
ECSQARU
2003
Springer
14 years 4 months ago
Web of Trust: Applying Probabilistic Argumentation to Public-Key Cryptography
1 The purpose of this paper is to show how probabilistic argumentation is applicable to modern public-key cryptography as an appropriate tool to evaluate webs of trust. This is an ...
Rolf Haenni
HUC
2003
Springer
14 years 4 months ago
Social Network Computing
Abstract. A ubiquitous wearable computing infrastructure is now firmly entrenched within organizations across the globe, yet much of its potential remains untapped. This paper desc...
Nathan Eagle, Alex Pentland