Sciweavers

17552 search results - page 122 / 3511
» Signal-regulated systems and networks
Sort
View
STANDARDVIEW
1998
71views more  STANDARDVIEW 1998»
13 years 9 months ago
Network externalities in software systems
Network externalities are the effects on the value of a product that can be ascribed to the presence of a network of users of such product. They play an essential role in the busi...
Giancarlo Succi, Paolo Predonzani, Andrea Valerio,...
GIS
2009
ACM
14 years 11 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
14 years 4 months ago
Optimal sensor hop selection: Sensor energy minimization and network lifetime maximization with guaranteed system performance
— In this paper we consider state estimation carried over a sensor network. A fusion center forms a local multi-hop tree of sensors and gateways and fuses the data into a state e...
Ling Shi, Karl Henrik Johansson, Richard M. Murray
ISI
2007
Springer
14 years 4 months ago
SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network
Abstract—We present an extended version of a software system SIGHTS1 (Statistical Identification of Groups Hidden in Time and Space), which can be used for the discovery, analys...
Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovy...
FPL
2005
Springer
137views Hardware» more  FPL 2005»
14 years 3 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk