Sciweavers

2116 search results - page 288 / 424
» Resource Analysis by Sup-interpretation
Sort
View
SEMWEB
2009
Springer
14 years 3 months ago
TripleRank: Ranking Semantic Web Data by Tensor Decomposition
Abstract. The Semantic Web fosters novel applications targeting a more efficient and satisfying exploitation of the data available on the web, e.g. faceted browsing of linked open...
Thomas Franz, Antje Schultz, Sergej Sizov, Steffen...
SERSCISA
2009
Springer
14 years 3 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
PIMRC
2008
IEEE
14 years 3 months ago
Connection admission control and grade of service for QoS routing in mesh networks
—Wireless mesh networks (WMNs) is a promising key technology for next generation wireless backhauling that have recently attracted both the academic and industrial interest. Such...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
SUTC
2008
IEEE
14 years 3 months ago
Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks
With the availability of low-cost sensor nodes there have been many standards developed to integrate and network these nodes to form a reliable network allowing many different typ...
Vasanth Iyer, Rammurthy Garimella, M. B. Srinivas
WIMOB
2008
IEEE
14 years 3 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao