Sciweavers

224 search results - page 38 / 45
» pervasive 2006
Sort
View
INFOCOM
2006
IEEE
14 years 4 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
INFOCOM
2006
IEEE
14 years 4 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
ISCAS
2006
IEEE
104views Hardware» more  ISCAS 2006»
14 years 4 months ago
Average lengths of wire routing under M-architecture and X-architecture
— The X-architecture is a new integrated-circuit wiring technique in the physical design. Compared with the currently used M-architecture, which uses either horizontal or vertica...
S. P. Shang, Xiaodong Hu, Tong Jing
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
14 years 4 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia
ISPDC
2006
IEEE
14 years 4 months ago
D-Grid, an E-Science Framework for German Scientists
The World Wide Web has become pervasive in many facets of our professional and personal lives during the past 10 years. Today, another Internet revolution is emerging: Grid Comput...
Wolfgang Gentzsch