Sciweavers

2503 search results - page 249 / 501
» Building Computer Network Attacks
Sort
View
INFOCOM
2010
IEEE
15 years 13 days ago
Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space
—We study how to characterize the families of paths between any two nodes s, t in a sensor network with holes. Two paths that can be deformed to one another through local changes...
Wei Zeng, Rik Sarkar, Feng Luo 0002, Xianfeng Gu, ...
COMPCON
1994
IEEE
15 years 6 months ago
The Newton Application Architecture
The application architecture of Newton, a technology for supporting Personal Digital Assistants (PDAs), is described. It combines a dynamic, object-oriented language called Newton...
Walter R. Smith
SAC
2008
ACM
15 years 1 months ago
Fast self-healing gradients
We present CRF-Gradient, a self-healing gradient algorithm that provably reconfigures in O(diameter) time. Selfhealing gradients are a frequently used building block for distribut...
Jacob Beal, Jonathan Bachrach, Daniel Vickery, Mar...
ICDCSW
2007
IEEE
15 years 8 months ago
A P2P Groupware Framework based on Operational Transformations
- Groupware applications deal with propagation of changes to networked users, consistency maintenance on concurrent access, and provision of awareness. We have built a P2P groupwar...
Leandro Quiroga, Alejandro Fernandez
DIS
2007
Springer
15 years 8 months ago
Machine Learning in Ecosystem Informatics
Ecosystem Informatics brings together mathematical and computational tools to address scientific and policy challenges in the ecosystem sciences. These challenges include novel s...
Thomas G. Dietterich