Sciweavers

1737 search results - page 285 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
IPPS
2000
IEEE
15 years 6 months ago
PaDDMAS: Parallel and Distributed Data Mining Application Suite
Discovering complex associations, anomalies and patterns in distributed data sets is gaining popularity in a range of scientific, medical and business applications. Various algor...
Omer F. Rana, David W. Walker, Maozhen Li, Steven ...
INFOCOM
2012
IEEE
13 years 4 months ago
Capacity of distributed content delivery in large-scale wireless ad hoc networks
—In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go throug...
Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zh...
144
Voted
ICPPW
2009
IEEE
15 years 2 days ago
Improvement of Messages Delivery Time on Vehicular Delay-Tolerant Networks
Vehicular Delay-Tolerant Networks (VDTNs) are an application of the Delay-Tolerant Network (DTN) concept, where the movement of vehicles and their message relaying service is used ...
Vasco Nuno da Gama de Jesus Soares, Joel Jos&eacut...
CIKM
2008
Springer
15 years 4 months ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...
BSN
2009
IEEE
118views Sensor Networks» more  BSN 2009»
15 years 9 months ago
Minimising Loss-Induced Errors in Real Time Wireless Sensing by Avoiding Data Dependency
Abstract—The use of local processing to reduce data transmission rates, and thereby power and bandwidth requirements, is common in wireless sensor networks. Achieving the minimum...
A. D. Young, M. J. Ling