Sciweavers

2503 search results - page 346 / 501
» Building Computer Network Attacks
Sort
View
P2P
2006
IEEE
135views Communications» more  P2P 2006»
15 years 7 months ago
Ordered Slicing of Very Large-Scale Overlay Networks
Recently there has been an increasing interest to harness the potential of P2P technology to design and build rich environments where services are provided and multiple applicatio...
Márk Jelasity, Anne-Marie Kermarrec
IWANN
2007
Springer
15 years 7 months ago
Intelligent Healthcare Managing: An Assistive Technology Approach
This paper is about the key role of Personalization through Ambient Intelligence in the development of Assistive Technologies for the elders. Ambient Intelligence implies three rel...
Ulises Cortés, Cristina Urdiales, Roberta A...
IJON
2002
71views more  IJON 2002»
15 years 1 months ago
Generation of the respiratory rhythm: state-dependency and switching
Two alternative concepts have been o ered to explain the neural mechanisms responsible for the generation of the respiratory motor pattern in the brainstem: a network paradigm and...
Ilya A. Rybak, Julian F. R. Paton, R. F. Rogers, W...
APNOMS
2009
Springer
15 years 8 months ago
Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding
Applications in wireless sensor networks (WSNs) experience the routing hole problem. That is, the current node cannot forward to the destination, although it is the closest node, b...
Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung...
ML
2010
ACM
185views Machine Learning» more  ML 2010»
14 years 8 months ago
Learning to rank on graphs
Graph representations of data are increasingly common. Such representations arise in a variety of applications, including computational biology, social network analysis, web applic...
Shivani Agarwal