Sciweavers

3584 search results - page 195 / 717
» Design considerations for a network of information
Sort
View
ENTCS
2007
131views more  ENTCS 2007»
14 years 10 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
KDD
2002
ACM
126views Data Mining» more  KDD 2002»
15 years 11 months ago
Integrating feature and instance selection for text classification
Instance selection and feature selection are two orthogonal methods for reducing the amount and complexity of data. Feature selection aims at the reduction of redundant features i...
Dimitris Fragoudis, Dimitris Meretakis, Spiros Lik...
CIKM
2004
Springer
15 years 4 months ago
Indexing text data under space constraints
An important class of queries is the LIKE predicate in SQL. In the absence of an index, LIKE queries are subject to performance degradation. The notion of indexing on substrings (...
Bijit Hore, Hakan Hacigümüs, Balakrishna...
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 5 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
TMC
2010
134views more  TMC 2010»
14 years 9 months ago
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks
—Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effec...
Claudia Canali, Maria Elena Renda, Paolo Santi, Si...