Sciweavers

1600 search results - page 246 / 320
» Clustering for opportunistic communication
Sort
View
116
Voted
APVIS
2008
15 years 2 months ago
StarGate: A Unified, Interactive Visualization of Software Projects
With the success of open source software projects, such as Apache and Mozilla, comes the opportunity to study the development process. In this paper, we present StarGate: a novel ...
Kwan-Liu Ma
88
Voted
FEWS
2007
15 years 2 months ago
Towards a Semantic Contact Management
Many organizations face every day the problem of effectively managing their contacts (customers, suppliers, partners, etc.), in terms of communication, clustering, networking, ana...
Irene Celino, Francesco Corcoglioniti, Emanuele De...
ATAL
2010
Springer
15 years 1 months ago
Improving DPOP with function filtering
DPOP is an algorithm for distributed constraint optimization which has, as main drawback, the exponential size of some of its messages. Recently, some algorithms for distributed c...
Ismel Brito, Pedro Meseguer
80
Voted
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 1 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
COMCOM
2008
244views more  COMCOM 2008»
15 years 27 days ago
Energy analysis of routing protocols for underwater wireless sensor networks
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
Mari Carmen Domingo, Rui Prior