Sciweavers

612 search results - page 87 / 123
» Locality in structured peer-to-peer networks
Sort
View
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
14 years 23 hour ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
LWA
2007
13 years 11 months ago
Context-adaptation based on Ontologies and Spreading Activation
Ontologies and spreading activation are known terms within the scope of information retrieval. In this paper we introduce SPREADR, an integrated adaptation mechanism for web appli...
Tim Hussein, Daniel Westheide, Jürgen Ziegler
DIALM
2003
ACM
139views Algorithms» more  DIALM 2003»
14 years 3 months ago
dBBlue: low diameter and self-routing bluetooth scatternet
This paper addresses the problem of scatternet formation for singlehop Bluetooth based ad hoc networks, with minimal communication overhead. We adopt the well-known structure de B...
Wen-Zhan Song, Xiang-Yang Li, Yu Wang 0003, Weizha...
IJPRAI
2002
97views more  IJPRAI 2002»
13 years 9 months ago
Shape Description and Invariant Recognition Employing Connectionist Approach
This paper presents a new approach for shape description and invariant recognition by geometric-normalization implemented by neural networks. The neural system consists of a shape...
Jezekiel Ben-Arie, Zhiqian Wang
SIGCOMM
2006
ACM
14 years 4 months ago
Building an AS-topology model that captures route diversity
An understanding of the topological structure of the Internet is needed for quite a number of networking tasks, e.g., making decisions about peering relationships, choice of upstr...
Wolfgang Mühlbauer, Anja Feldmann, Olaf Maenn...