Sciweavers

3343 search results - page 296 / 669
» Network Objects
Sort
View
AAAI
2010
15 years 5 months ago
The Genetic Algorithm as a General Diffusion Model for Social Networks
Diffusion processes taking place in social networks are used to model a number of phenomena, such as the spread of human or computer viruses, and the adoption of products in `vira...
Mayank Lahiri, Manuel Cebrián
CCR
2010
133views more  CCR 2010»
15 years 4 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
130
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Scalable Localization with Mobility Prediction for Underwater Sensor Networks
—Due to adverse aqueous environments, non-negligible node mobility and large network scale, localization for large-scale mobile underwater sensor networks is very challenging. In...
Zhong Zhou, Jun-Hong Cui, Amvrossios Bagtzoglou
ADHOC
2005
116views more  ADHOC 2005»
15 years 3 months ago
Power efficient routing trees for ad hoc wireless networks using directional antenna
In ad hoc wireless networks, nodes are typically powered by batteries. Therefore saving energy has become a very important objective, and different algorithms have been proposed t...
Fei Dai, Qing Dai, Jie Wu
OPODIS
2007
15 years 5 months ago
Peer to Peer Multidimensional Overlays: Approximating Complex Structures
Peer to peer overlay networks have proven to be a good support for storing and retrieving data in a fully decentralized way. A sound approach is to structure them in such a way tha...
Olivier Beaumont, Anne-Marie Kermarrec, Etienne Ri...