Sciweavers

40 search results - page 2 / 8
» Network Positioning from the Edge - An Empirical Study of th...
Sort
View
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
13 years 11 months ago
Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?
Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, wit...
Fu-ren Lin, Sheng-cheng Lin, Ying-fen Wang
IMC
2006
ACM
13 years 11 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
BIBE
2005
IEEE
154views Bioinformatics» more  BIBE 2005»
13 years 10 months ago
Effective Pre-Processing Strategies for Functional Clustering of a Protein-Protein Interactions Network
In this article we present novel preprocessing techniques, based on topological measures of the network, to identify clusters of proteins from Protein-protein interaction (PPI) ne...
Duygu Ucar, Srinivasan Parthasarathy, Sitaram Asur...
INFOCOM
2010
IEEE
13 years 3 months ago
Compressive Sensing Based Positioning Using RSS of WLAN Access Points
Abstract— The sparse nature of location finding problem makes the theory of compressive sensing desirable for indoor positioning in Wireless Local Area Networks (WLANs). In this...
Chen Feng, Wain Sy Anthea Au, Shahrokh Valaee, Zhe...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
13 years 11 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...