Sciweavers

5723 search results - page 889 / 1145
» Network Management
Sort
View
ICDIM
2007
IEEE
15 years 11 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
MUE
2007
IEEE
107views Multimedia» more  MUE 2007»
15 years 11 months ago
A Predictive Location Based Relaying scheme for hybrid Cellular and Ad-hoc Systems
We propose a predictive location based relaying for hybrid cellular and ad-hoc systems that can provide interference minimization to uplink transmission. In the case of dense netw...
Tae Sung Kim, Kang Jin Yoon, Young Yong Kim
RR
2007
Springer
15 years 11 months ago
Evaluating Formalisms for Modular Ontologies in Distributed Information Systems
Modern semantic technology is one of the necessary supports for the infrastructure of next generation information systems. In particular, large international organizations, which u...
Yimin Wang, Jie Bao, Peter Haase, Guilin Qi
AICT
2006
IEEE
15 years 11 months ago
Privacy and data protection in technology-enhanced professional learning
Privacy provision and data protection are basic requirements for professional learning, especially when personalized systems are used that adapt to sensitive learner personal data...
Tomaz Klobucar
AICT
2006
IEEE
101views Communications» more  AICT 2006»
15 years 11 months ago
Erasure Codes for Increasing the Availability of Grid Data Storage
In this paper, we describe the design of a highlyavailable Grid data storage system. Increased availability is ensured by data redundancy and file striping. Redundant data is com...
Mikko Pitkänen, Rim Moussa, D. Martin Swany, ...