Sciweavers

447 search results - page 83 / 90
» On the Distribution of Nodes in Distributed Hash Tables
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
IWPSE
2007
IEEE
15 years 3 months ago
Structural analysis and visualization of C++ code evolution using syntax trees
We present a method to detect and visualize evolution patterns in C++ source code. Our method consists of three steps. First, we extract an annotated syntax tree (AST) from each v...
Fanny Chevalier, David Auber, Alexandru Telea
DSN
2004
IEEE
15 years 1 months ago
Impact of Path Diversity on Multi-homed and Overlay Networks
Multi-homed and overlay networks are two widely studied approaches aimed at leveraging the inherent redundancy of the Internet's underlying routing infrastructure to enhance ...
Junghee Han, Farnam Jahanian
91
Voted
UAI
1996
14 years 10 months ago
Context-Specific Independence in Bayesian Networks
Bayesiannetworks provide a languagefor qualitatively representing the conditional independence properties of a distribution. This allows a natural and compact representation of th...
Craig Boutilier, Nir Friedman, Moisés Golds...
LREC
2010
135views Education» more  LREC 2010»
14 years 11 months ago
Language Resource Management System for Asian WordNet Collaboration and Its Web Service Application
This paper presents the language resource management system for the development and dissemination of Asian WordNet (AWN) and its web service application. We develop the platform t...
Virach Sornlertlamvanich, Thatsanee Charoenporn, H...