Sciweavers

1207 search results - page 183 / 242
» Towards optimal k-anonymization
Sort
View
TRIDENTCOM
2008
IEEE
14 years 3 months ago
On the use of SHIM6 for mobility support in IMS networks
—The future of network communications is moving towards deployment of an all-IP core network. This has given rise to many devices hitting the market equipped with multiple networ...
John Ronan, Sasitharan Balasubramaniam, Adnan K. K...
WETICE
2008
IEEE
14 years 3 months ago
Service Discovery for Semantic Peer-to-Peer Cooperation
In recent years, many collaborative organizations started to experience the application of methods and tools for semantic-driven service discovery in a P2P-based scenario. A criti...
Devis Bianchini, Valeria De Antonellis, Michele Me...
ADHOCNOW
2008
Springer
14 years 3 months ago
Geographic Routing with Early Obstacles Detection and Avoidance in Dense Wireless Sensor Networks
Existing geographic routing algorithms for sensor networks are mainly concerned with finding a path toward a destination, without explicitly addressing the impact of obstacles on ...
Luminita Moraru, Pierre Leone, Sotiris E. Nikolets...
DSN
2007
IEEE
14 years 3 months ago
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance
Transient faults are emerging as a critical concern in the reliability of general-purpose microprocessors. As architectural trends point towards multi-threaded multi-core designs,...
Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Josep...
ECRTS
2007
IEEE
14 years 3 months ago
On Dominating Set Allocation Policies in Real-Time Wide-Area Distributed Systems
This paper investigates resource allocation policies for achieving real-time content distribution with subsecond delay bounds on the current Internet. Resource allocation in real-...
Chengdu Huang, Tarek F. Abdelzaher, Xue Liu