Sciweavers

4435 search results - page 850 / 887
» Networking named content
Sort
View
IJCNN
2006
IEEE
14 years 3 months ago
Tentacled Self-Organizing Map for Effective Data Extraction
— Since we can accumulate a huge amount of data including useless information in these years, it is important to investigate various extraction method of clusters from data inclu...
Haruna Matsushita, Yoshifumi Nishio
SOUPS
2006
ACM
14 years 3 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
INFOCOM
2005
IEEE
14 years 3 months ago
Bayesian packet loss detection for TCP
— One of TCP’s critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implem...
Nahur Fonseca, Mark Crovella
MSWIM
2005
ACM
14 years 3 months ago
Topology control with better radio models: implications for energy and multi-hop interference
Topology Control (TC) is a well-studied technique used in wireless ad hoc networks to find energy-efficient and/or low-interference subgraphs of the maxpower communication graph....
Douglas M. Blough, Mauro Leoncini, Giovanni Resta,...
ATAL
2005
Springer
14 years 3 months ago
Preprocessing techniques for accelerating the DCOP algorithm ADOPT
Methods for solving Distributed Constraint Optimization Problems (DCOP) have emerged as key techniques for distributed reasoning. Yet, their application faces significant hurdles...
Syed Muhammad Ali, Sven Koenig, Milind Tambe