Sciweavers

1407 search results - page 148 / 282
» Join-Graph Propagation Algorithms
Sort
View
INFOSCALE
2006
ACM
14 years 3 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
AINA
2005
IEEE
14 years 2 months ago
Nodes Localization through Data Fusion in Sensor Network
The Location of nodes in sensor network is an important problem with application in resource allocation, location sensitive browsing, and emergency communications. A key problem i...
Ren C. Luo, Ogst Chen, Liang Chao Tu
DSN
2005
IEEE
14 years 2 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
MM
2005
ACM
209views Multimedia» more  MM 2005»
14 years 2 months ago
Learning an image-word embedding for image auto-annotation on the nonlinear latent space
Latent Semantic Analysis (LSA) has shown encouraging performance for the problem of unsupervised image automatic annotation. LSA conducts annotation by keywords propagation on a l...
Wei Liu, Xiaoou Tang
WS
2005
ACM
14 years 2 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble