Sciweavers

4435 search results - page 170 / 887
» Networking named content
Sort
View
134
Voted
RAID
2010
Springer
15 years 2 months ago
Abusing Social Networks for Automated User Profiling
Recently, social networks such as Facebook have experienced a huge surge in popularity. The amount of personal information stored on these sites calls for appropriate security prec...
Marco Balduzzi, Christian Platzer, Thorsten Holz, ...

Lecture Notes
2028views
17 years 1 months ago
A Short Introduction to Operating System
As the name implies, it is a short introduction about operating system.
Mark Burgess
AISS
2010
113views more  AISS 2010»
15 years 2 months ago
The Object Replication Method for the Efficient Migration of Agent
The migration method of a mobile agent affects the entire performance of the distributed system. Most of the existing migration methods have the slow-witted structures due to the ...
Yonsik Lee, Kwangwoo Nam
IJACTAICIT
2010
169views more  IJACTAICIT 2010»
15 years 2 months ago
The Migration of Mobile Agent Using the Object Replication
The migration method of a mobile agent affects the entire performance of the distributed system. Most of the existing migration methods have the slow-witted structures due to the ...
Yonsik Lee, Jeongsu Lee
WCNC
2008
IEEE
15 years 11 months ago
Connectivity-Aware Network Maintenance via Relays Deployment
— In this paper, we address the network maintenance problem, in which we aim to maximize the lifetime of a sensor network by adding a set of relays to it. The network lifetime is...
Ahmed S. Ibrahim, Karim G. Seddik, K. J. Ray Liu