Sciweavers

9260 search results - page 1822 / 1852
» Posterior distributions are computable from predictive distr...
Sort
View
NSPW
2004
ACM
14 years 1 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
SENSYS
2004
ACM
14 years 1 months ago
Mitigating congestion in wireless sensor networks
Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality t...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
SENSYS
2004
ACM
14 years 1 months ago
Hardware design experiences in ZebraNet
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned a great deal of research on the topic, and this research is now producing ...
Pei Zhang, Christopher M. Sadler, Stephen A. Lyon,...
SIGIR
2004
ACM
14 years 1 months ago
An automatic weighting scheme for collaborative filtering
Collaborative filtering identifies information interest of a particular user based on the information provided by other similar users. The memory-based approaches for collaborativ...
Rong Jin, Joyce Y. Chai, Luo Si
STOC
2004
ACM
138views Algorithms» more  STOC 2004»
14 years 1 months ago
Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks
Several peer-to-peer networks are based upon randomized graph topologies that permit efficient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and const...
Gurmeet Singh Manku, Moni Naor, Udi Wieder
« Prev « First page 1822 / 1852 Last » Next »