Sciweavers

640 search results - page 20 / 128
» Topology Without Tears
Sort
View
EDBTW
2006
Springer
13 years 11 months ago
Towards Similarity-Based Topological Query Languages
Abstract. In recent times, the proliferation of spatial data on the Internet is beginning to allow a much larger audience to access and share data currently available in various Ge...
Alberto Belussi, Omar Boucelma, Barbara Catania, Y...
IAT
2009
IEEE
14 years 2 months ago
Topology and Memory Effect on Convention Emergence
Abstract—Social conventions are useful self-sustaining protocols for groups to coordinate behavior without a centralized entity enforcing coordination. We perform an in-depth stu...
Daniel Villatoro, Sandip Sen, Jordi Sabater-Mir
ICPP
2007
IEEE
14 years 1 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...
CCS
2007
ACM
14 years 1 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
ICNP
2003
IEEE
14 years 27 days ago
On the Cost-Quality Tradeoff in Topology-Aware Overlay Path Probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as ¢¤£¦¥¨§© , which is prohibitive i...
Chiping Tang, Philip K. McKinley