Sciweavers

2321 search results - page 344 / 465
» A Protocol for a Distributed Recommender System
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 7 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
SASO
2008
IEEE
15 years 10 months ago
Self-Adaptive Dissemination of Data in Dynamic Sensor Networks
The distribution of data in large dynamic wireless sensor networks presents a difficult problem due to node mobility, link failures, and traffic congestion. In this paper, we pr...
David Dorsey, Bjorn Jay Carandang, Moshe Kam, Chri...
IAT
2007
IEEE
15 years 10 months ago
Convergence of Peer-to-Peer Collision Avoidance among Unmanned Aerial Vehicles
In this article we study the theoretical aspects of the collision avoidance among the collectives of unmanned aerial vehicles (UAVs) engaged in the free flight operation. The fre...
Premysl Volf, David Sislák, Michal Pechouce...
ICDCSW
2007
IEEE
15 years 10 months ago
Modeling Data Consistency in Wireless Sensor Networks
— With the rapid growth of wireless sensor systems deployment, data quality has become a critical issue to the success of these applications. In this paper, we first raise the d...
Kewei Sha, Weisong Shi
ICA3PP
2007
Springer
15 years 10 months ago
RSM-Based Gossip on P2P Network
Classification is a kind of basic semantics that people often use to manage versatile contents in daily life. Resource Space Model (RSM) is a semantic model for sharing and managin...
Hai Zhuge, Xiang Li