Sciweavers

560 search results - page 105 / 112
» The Speed of Information Propagation in Large Wireless Netwo...
Sort
View
IJISEC
2007
119views more  IJISEC 2007»
13 years 7 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
INFOCOM
1997
IEEE
13 years 11 months ago
Bulk Multicast Transport Protocol
BMTP offers rate controlled multicast with reliability, high throughput, and support for large numbers of receivers. A multicast sender needs feedback from receivers to recover fr...
Robert Morris
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
13 years 5 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
BIOCOMP
2008
13 years 8 months ago
Prediction of Protein Function Using Graph Container and Message Passing
We introduce a novel parameter called container flux, which is used to measure the information sharing capacity between two distinct nodes in a graph. Other useful information, bot...
Hongbo Zhou, Qiang Shawn Cheng, Mehdi Zargham
CHI
2010
ACM
14 years 2 months ago
Rethinking RFID: awareness and control for interaction with RFID systems
People now routinely carry radio frequency identification (RFID) tags – in passports, driver’s licenses, credit cards, and other identifying cards – where nearby RFID reader...
Nicolai Marquardt, Alex S. Taylor, Nicolas Villar,...