Sciweavers

4435 search results - page 192 / 887
» Networking named content
Sort
View
177
Voted
ADHOCNOW
2006
Springer
15 years 11 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
COMCOM
2008
127views more  COMCOM 2008»
15 years 5 months ago
A dynamic routing protocol for keyword search in unstructured peer-to-peer networks
The idea of building query-oriented routing indices has changed the way of improving keyword search efficiency from the basis as it can learn the content distribution from the que...
Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Y...
171
Voted
ICDM
2007
IEEE
153views Data Mining» more  ICDM 2007»
15 years 11 months ago
HSN-PAM: Finding Hierarchical Probabilistic Groups from Large-Scale Networks
Real-world social networks are often hierarchical, reflecting the fact that some communities are composed of a few smaller, sub-communities. This paper describes a hierarchical B...
Haizheng Zhang, Wei Li, Xuerui Wang, C. Lee Giles,...
106
Voted
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 5 months ago
A proposed "osi based" network troubles identification model
The OSI model, developed by ISO in 1984, attempts to summarize complicated network cases on layers. Moreover, network troubles are expressed by taking the model into account. Howe...
Murat Kayri, Ismail Kayri
140
Voted
PERCOM
2005
ACM
16 years 4 months ago
Media Distribution in a Pervasive Computing Environment
Distribution of media in the fast growing world of digital stored content and multimedia supporting devices with connectivity, calls for a new media distribution architecture. The...
Winfried A. H. Berkvens, Arjan Claassen, Joep P. v...