Sciweavers

4499 search results - page 776 / 900
» Hyper-selection in dynamic environments
Sort
View
CN
2007
141views more  CN 2007»
14 years 10 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
CN
2007
120views more  CN 2007»
14 years 10 months ago
A case for Passive Application Layer Multicast
Over the last few years, application-layer multicast (ALM) has emerged as a plausible solution for supporting group-oriented applications. However, ALM suffers from inefficiency ...
Xiaolong Li, Aaron Striegel
IJCOMSYS
2006
99views more  IJCOMSYS 2006»
14 years 10 months ago
Distributed policy processing in active-service based infrastructures
More and more applications in the Internet are requiring an intelligent service infrastructure to provide customized services. In this paper, we present an infrastructure, which c...
Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
ISI
2008
Springer
14 years 10 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
IJSNET
2006
131views more  IJSNET 2006»
14 years 10 months ago
Medium access control with mobility-adaptive mechanisms for wireless sensor networks
: Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor n...
Muneeb Ali, Zartash Afzal Uzmi