Sciweavers

1037 search results - page 147 / 208
» A view of canonical extension
Sort
View
CCR
2006
82views more  CCR 2006»
14 years 12 months ago
The internet AS-level topology: three data sources and one definitive metric
We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP,...
Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenk...
CORR
2006
Springer
142views Education» more  CORR 2006»
14 years 12 months ago
Social Browsing on Flickr
The new social media sites--blogs, wikis, del.icio.us and Flickr, among others--underscore the transformation of the Web to a participatory medium in which users are actively crea...
Kristina Lerman, Laurie Jones
IJNSEC
2008
150views more  IJNSEC 2008»
14 years 12 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ISCI
2008
145views more  ISCI 2008»
14 years 12 months ago
Aggregation in sensor networks with a user-provided quality of service goal
Significant research has been devoted to aggregation in sensor networks with a view to optimize its performance. Existing research has mostly concentrated on maximizing network li...
Zhen He, Byung Suk Lee, Xiaoyang Sean Wang
JCP
2008
160views more  JCP 2008»
14 years 12 months ago
A Bluetooth-based Sensor Node for Low-Power Ad Hoc Networks
TCP/IP has recently taken promising steps toward being a viable communication architecture for networked sensor nodes. Furthermore, the use of Bluetooth can enable a wide range of ...
Jens Eliasson, Per Lindgren, Jerker Delsing