Sciweavers

702 search results - page 63 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
ERCIMDL
2008
Springer
111views Education» more  ERCIMDL 2008»
14 years 11 months ago
Information Retrieval and Filtering over Self-organising Digital Libraries
We present iClusterDL, a self-organising overlay network that supports information retrieval and filtering functionality in a digital library environment. iClusterDL is able to han...
Paraskevi Raftopoulou, Euripides G. M. Petrakis, C...
HPCC
2007
Springer
15 years 4 months ago
A Proactive Method for Content Distribution in a Data Indexed DHT Overlay
In a data-indexed DHT overlay network, published data annotations form distributed databases. Queries are distributed to these databases in a nonuniform way. Constructing content d...
Bassam A. Alqaralleh, Chen Wang, Bing Bing Zhou, A...
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 4 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
IFIP
2007
Springer
15 years 4 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
KDD
2002
ACM
182views Data Mining» more  KDD 2002»
15 years 10 months ago
ANF: a fast and scalable tool for data mining in massive graphs
Graphs are an increasingly important data source, with such important graphs as the Internet and the Web. Other familiar graphs include CAD circuits, phone records, gene sequences...
Christopher R. Palmer, Phillip B. Gibbons, Christo...