Sciweavers

910 search results - page 115 / 182
» Automatic Metadata Generation using Associative Networks
Sort
View
114
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Capacity-Constrained Design of Resilient Multi-Tier Wireless Mesh Networks
nts etc.), an abstract graph of the deployment area and QoS constraints to generate appropriate logical topologies. WIND starts with the set of network elements to be deployed (Nod...
R. Raghuraman, Sridhar Iyer
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
15 years 5 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
123
Voted
BC
2002
133views more  BC 2002»
15 years 12 days ago
Cortical network reorganization guided by sensory input features
Abstract. Sensory experience alters the functional organization of cortical networks. Previous studies using behavioral training motivated by aversive or rewarding stimuli have dem...
Michael P. Kilgard, Pritesh K. Pandya, Navzer D. E...
105
Voted
DSN
2008
IEEE
15 years 2 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
115
Voted
ICITA
2005
IEEE
15 years 6 months ago
A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...