Sciweavers

2014 search results - page 291 / 403
» Network Management Challenges for Next Generation Networks
Sort
View
KDD
2002
ACM
171views Data Mining» more  KDD 2002»
14 years 9 months ago
Mining complex models from arbitrarily large databases in constant time
In this paper we propose a scaling-up method that is applicable to essentially any induction algorithm based on discrete search. The result of applying the method to an algorithm ...
Geoff Hulten, Pedro Domingos
MIDDLEWARE
2004
Springer
14 years 2 months ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
ICNP
1999
IEEE
14 years 1 months ago
ERUF: Early Regulation of Unresponsive Best-Effort Traffic
In this paper, we propose router mechanisms to regulate unresponsive best-effort traffic. By unresponsive traffic we mean flows that do not reduce their sending rate in response t...
Anand Rangarajan, Anurag Acharya
SIMUTOOLS
2008
13 years 10 months ago
Bridging UMTS and multicast routing in ns-2
In this paper, we present the design and the implementation of a novel scheme for the multicast transmission of data over Universal Mobile Telecommunications System (UMTS) network...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
MOBIHOC
2007
ACM
14 years 9 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao