Sciweavers

1266 search results - page 115 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ERCIMDL
2008
Springer
111views Education» more  ERCIMDL 2008»
15 years 6 months ago
Information Retrieval and Filtering over Self-organising Digital Libraries
We present iClusterDL, a self-organising overlay network that supports information retrieval and filtering functionality in a digital library environment. iClusterDL is able to han...
Paraskevi Raftopoulou, Euripides G. M. Petrakis, C...
ADHOC
2007
95views more  ADHOC 2007»
15 years 4 months ago
Sink-to-sensors congestion control
— The problem of congestion in sensor networks is significantly different from conventional ad-hoc networks and has not been studied to any great extent thus far. In this paper,...
Ramanuja Vedantham, Raghupathy Sivakumar, Seung-Jo...
APNOMS
2006
Springer
15 years 8 months ago
Information-Driven Task Routing for Network Management in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Given their unat...
Yu Liu, Yumei Wang, Lin Zhang, Chan-Hyun Youn
PERCOM
2006
ACM
16 years 4 months ago
Adaptive Medical Feature Extraction for Resource Constrained Distributed Embedded Systems
Tiny embedded systems have not been an ideal outfit for high performance computing due to their constrained resources. Limitations in processing power, battery life, communication ...
Roozbeh Jafari, Hyduke Noshadi, Majid Sarrafzadeh,...
UM
2009
Springer
15 years 11 months ago
Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites
Abstract. Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, we proposed a dynamic privacy-enhancing user modeli...
Yang Wang 0005, Alfred Kobsa