Sciweavers

365 search results - page 63 / 73
» The Strong Eternity Service
Sort
View
CIKM
2006
Springer
13 years 11 months ago
Summarizing local context to personalize global web search
The PC Desktop is a very rich repository of personal information, efficiently capturing user's interests. In this paper we propose a new approach towards an automatic persona...
Paul-Alexandru Chirita, Claudiu S. Firan, Wolfgang...
ESAS
2004
Springer
13 years 11 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
DIMVA
2004
13 years 9 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
SODA
2000
ACM
122views Algorithms» more  SODA 2000»
13 years 9 months ago
Cooperative facility location games
The location of facilities in order to provide service for customers is a well-studied problem in the operations research literature. In the basic model, there is a predefined cos...
Michel X. Goemans, Martin Skutella
CN
2007
100views more  CN 2007»
13 years 7 months ago
A simple FIFO-based scheme for differentiated loss guarantees
— Today’s Internet carries an ever broadening range of application traffic with different requirements. This has stressed its original, one-class, best-effort model, and has b...
Yaqing Huang, Roch Guérin