Sciweavers

5358 search results - page 1058 / 1072
» Script-based Presentation of Simulation Results
Sort
View
IJIIDS
2008
201views more  IJIIDS 2008»
15 years 2 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
116
Voted
CCR
2007
107views more  CCR 2007»
15 years 2 months ago
Dynamic load balancing without packet reordering
Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes or link failures. Dynamic load balancing protocols, ho...
Srikanth Kandula, Dina Katabi, Shantanu Sinha, Art...
IJSN
2008
145views more  IJSN 2008»
15 years 2 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
CN
2007
146views more  CN 2007»
15 years 2 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
IJNSEC
2006
162views more  IJNSEC 2006»
15 years 2 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
« Prev « First page 1058 / 1072 Last » Next »