Sciweavers

301 search results - page 40 / 61
» Reconsidering Network Effect Theory
Sort
View
MOBIHOC
2008
ACM
14 years 8 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
SAC
2004
ACM
14 years 2 months ago
An architecture for information retrieval over semi-collaborating Peer-to-Peer networks
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying net...
Iraklis A. Klampanos, Joemon M. Jose
AIS
2010
Springer
13 years 9 months ago
Community networks and the evolution of civic intelligence
Although the intrinsic physicality of human beings has not changed in millennia, the species has managed to profoundly reconstitute the physical and social world it inhabits. Alth...
Douglas Schuler
JSAC
2007
140views more  JSAC 2007»
13 years 9 months ago
Cross-layer resource allocation over wireless relay networks for quality of service provisioning
— We propose a physical-datalink cross-layer resource allocation scheme over wireless relay networks for quality-ofservice (QoS) guarantees. By integrating information theory wit...
Jia Tang, Xi Zhang
ATAL
2003
Springer
14 years 2 months ago
Searching social networks
A referral system is a multiagent system whose member agents are capable of giving and following referrals. The specific cases of interest arise where each agent has a user. The ...
Bin Yu, Munindar P. Singh