Sciweavers

7189 search results - page 1133 / 1438
» Connecting Design with Code
Sort
View
CORR
2011
Springer
170views Education» more  CORR 2011»
14 years 11 months ago
Performance Comparison and Analysis of Preemptive-DSR and TORA
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. Preemptiv...
V. Ramesh, P. Subbaiah, N. Koteswar Rao, N. Subhas...
COLING
2010
14 years 11 months ago
A Semantic Network Approach to Measuring Relatedness
Humans are very good at judging the strength of relationships between two terms, a task which, if it can be automated, would be useful in a range of applications. Systems attempti...
Brian Harrington
EJWCN
2011
77views more  EJWCN 2011»
14 years 11 months ago
Emulating Opportunistic Networks with KauNet Triggers
In opportunistic networks the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. ...
Tanguy Pérennou, Anna Brunstrom, Tomas Hall...
FIRSTMONDAY
2011
125views more  FIRSTMONDAY 2011»
14 years 11 months ago
The more people I meet, the more I like my dog: A study of pet-oriented social networks on the Web
There has been extensive research into friend-oriented and professional social networking websites, but relatively little work on passion-oriented sites designed to connect strang...
Jennifer Golbeck
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 11 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
« Prev « First page 1133 / 1438 Last » Next »