Sciweavers

1250 search results - page 166 / 250
» Membership-concealing overlay networks
Sort
View
DCOSS
2006
Springer
14 years 2 months ago
GIST: Group-Independent Spanning Tree for Data Aggregation in Dense Sensor Networks
Abstract. Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions o...
Lujun Jia, Guevara Noubir, Rajmohan Rajaraman, Rav...
CCGRID
2006
IEEE
14 years 4 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
NAR
2011
224views Computer Vision» more  NAR 2011»
13 years 1 months ago
KaPPA-View4: a metabolic pathway database for representation and analysis of correlation networks of gene co-expression and meta
Correlations of gene-to-gene co-expression and metabolite-to-metabolite co-accumulation calculated from large amounts of transcriptome and metabolome data are useful for uncoverin...
Nozomu Sakurai, Takeshi Ara, Yoshiyuki Ogata, Ryos...
GPC
2009
Springer
14 years 2 months ago
G2G: A Meta-Grid Framework for the Convergence of P2P and Grids
Grid systems integrate distributed resources to form self-organization and self-management autonomies. Recently, for large-scale computation requirement, the collaboration of diffe...
Wu-Chun Chung, Chin-Jung Hsu, Yi-Shiang Lin, Kuan-...
CSREAPSC
2006
13 years 11 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...