Sciweavers

729 search results - page 83 / 146
» Computing persistent homology
Sort
View
60
Voted
ICNP
2007
IEEE
15 years 4 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
ICCS
2007
Springer
15 years 4 months ago
Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems
This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consis...
Sarat Sreepathi, Kumar Mahinthakumar, Emily M. Zec...
SKG
2005
IEEE
15 years 3 months ago
An Evaluation of RDF Storage Systems for Large Data Applications
In this paper, evaluation on 7 RDF storage systems with respect to the large data applications is presented. By using the toolkit LUBM-R, 4 different scales of RDF datasets to pro...
Baolin Liu, Bo Hu
DIALM
1999
ACM
113views Algorithms» more  DIALM 1999»
15 years 2 months ago
Flooding for reliable multicast in multi-hop ad hoc networks
Ad hoc networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the...
Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar...
DALT
2008
Springer
14 years 11 months ago
Strategic Agent Communication: An Argumentation-Driven Approach
Abstract. This paper proposes a formal framework for agent communication where agents can reason about their goals using strategic reasoning. This reasoning is argumentation-based ...
Jamal Bentahar, Mohamed Mbarki, John-Jules Ch. Mey...