Sciweavers

2347 search results - page 466 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
VIZSEC
2005
Springer
14 years 1 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
WINE
2005
Springer
155views Economy» more  WINE 2005»
14 years 1 months ago
Economic Analysis of Networking Technologies for Rural Developing Regions
Abstract. Providing network connectivity to rural regions in the developing world is an economically challenging problem especially given the low income levels and low population d...
Shridhar Mubaraq Mishra, John Hwang, Dick Filippin...
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
14 years 1 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...
SAC
2004
ACM
14 years 1 months ago
An architecture for information retrieval over semi-collaborating Peer-to-Peer networks
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying net...
Iraklis A. Klampanos, Joemon M. Jose
ATAL
2004
Springer
14 years 1 months ago
Multi-Agent Service Description/Discovery Games
Agent description and discovery (ADD) is a critical infrastructure for open multi-agent services. As multi-agent systems grow larger and more diverse, it becomes harder to locate ...
Jun Wang, Les Gasser