Sciweavers

1869 search results - page 247 / 374
» Analysis of Network Processing Workloads
Sort
View
DCOSS
2006
Springer
15 years 7 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
125
Voted
ICANN
1997
Springer
15 years 7 months ago
Topology Representing Networks for Intrinsic Dimensionality Estimation
Abstract. In this paper we compare two methods for intrinsic dimensionality (ID) estimation based on optimally topology preserving maps (OTPMs). The rst one is a direct approach, w...
Jörg Bruske, Gerald Sommer
BIOCOMP
2009
15 years 4 months ago
Evolution of Domain Compositions in the Metabolic Networks of Human and Escherichia Coli
It is widely recognized that complexity of metabolic networks arises from duplication, recruitment and recombination of enzyme protein domains. However, variations of the domain ev...
Chen-Hsiang Yeang, Nils Baas
126
Voted
COMCOM
2008
138views more  COMCOM 2008»
15 years 3 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
PETRA
2009
ACM
15 years 10 months ago
Identifying people in camera networks using wearable accelerometers
We propose a system to identify people in a sensor network. The system fuses motion information measured from wearable accelerometer nodes with motion traces of each person detect...
Thiago Teixeira, Deokwoo Jung, Gershon Dublon, And...