Sciweavers

167 search results - page 29 / 34
» Querying Temporal Constraint Networks: A Unifying Approach
Sort
View
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
SSDBM
2007
IEEE
138views Database» more  SSDBM 2007»
14 years 1 months ago
Reliable Hierarchical Data Storage in Sensor Networks
The ability to provide reliable in-network storage while balancing the energy consumption of individual sensors is a primary concern when deploying a sensor network. The main conc...
Song Lin, Benjamin Arai, Dimitrios Gunopulos
ML
2000
ACM
150views Machine Learning» more  ML 2000»
13 years 7 months ago
Adaptive Retrieval Agents: Internalizing Local Context and Scaling up to the Web
This paper discusses a novel distributed adaptive algorithm and representation used to construct populations of adaptive Web agents. These InfoSpiders browse networked information ...
Filippo Menczer, Richard K. Belew
COMCOM
2006
88views more  COMCOM 2006»
13 years 7 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
EUROPAR
2009
Springer
14 years 2 days ago
Real-Time Issues in Live Migration of Virtual Machines
This paper addresses the issue of how to meet the strict timing constraints of (soft) real-time virtualized applications while the Virtual Machine (VM) hosting them is undergoing a...
Fabio Checconi, Tommaso Cucinotta, Manuel Stein