Sciweavers

274 search results - page 36 / 55
» Network reinforcement
Sort
View
127
Voted
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
KDD
2010
ACM
318views Data Mining» more  KDD 2010»
14 years 8 months ago
DivRank: the interplay of prestige and diversity in information networks
Information networks are widely used to characterize the relationships between data items such as text documents. Many important retrieval and mining tasks rely on ranking the dat...
Qiaozhu Mei, Jian Guo, Dragomir R. Radev
NETCOOP
2007
Springer
15 years 3 months ago
Load Shared Sequential Routing in MPLS Networks: System and User Optimal Solutions
Recently Gerald Ash has shown through case studies that event dependent routing is attractive in large scale multi-service MPLS networks. In this paper, we consider the application...
Gilles Brunet, Fariba Heidari, Lorne Mason
92
Voted
AINA
2009
IEEE
15 years 4 months ago
A Property Based Framework for Trust and Reputation in Mobile Computing
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based ...
Kevin Jones, Helge Janicke, Antonio Cau
LAWEB
2008
IEEE
15 years 4 months ago
Web Interactivity in the Perspective of Young Users
This paper presents the results of a qualitative research whose objective was to broaden the understanding on the participation of youngsters and adolescents on Internet-based soc...
Caroline Queiroz Santos, Ana Maria Pereira Cardoso