Sciweavers

2983 search results - page 550 / 597
» Using Clustering Information for Sensor Network Localization
Sort
View
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 7 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
PVLDB
2010
106views more  PVLDB 2010»
13 years 6 months ago
Just-in-time Data Integration in Action
Today’s data integration systems must be flexible enough to support the typical iterative and incremental process of integration, and may need to scale to hundreds of data sour...
Martin Hentschel, Laura M. Haas, Renée J. M...
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
14 years 8 months ago
Ranking distributed probabilistic data
Ranking queries are essential tools to process large amounts of probabilistic data that encode exponentially many possible deterministic instances. In many applications where unce...
Feifei Li, Ke Yi, Jeffrey Jestes
P2PKM
2004
13 years 9 months ago
RDFGrowth, a P2P annotation exchange algorithm for scalable Semantic Web applications
We present RDFGrowth, an algorithm that addresses a specific yet important scenario: large scale, end user targeted, metadata exchange P2P applications. In this scenario, peers per...
Giovanni Tummarello, Christian Morbidoni, Joackin ...
IH
2004
Springer
14 years 1 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...