Sciweavers

2912 search results - page 382 / 583
» Overlay Networks - Implementation by Specification
Sort
View
TIP
2010
170views more  TIP 2010»
14 years 11 months ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
KDD
2008
ACM
211views Data Mining» more  KDD 2008»
16 years 5 months ago
ArnetMiner: extraction and mining of academic social networks
This paper addresses several key issues in the ArnetMiner system, which aims at extracting and mining academic social networks. Specifically, the system focuses on: 1) Extracting ...
Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zha...
ACSAC
2009
IEEE
15 years 9 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
EURONGI
2008
Springer
15 years 6 months ago
Interference-Aware Channel Assignment in Wireless Mesh Networks
DED ABSTRACT The increased popularity and the growth in the number of deployed IEEE 802.11 Access Points (APs) have raised the opportunity to merge together various disjointed wire...
Rosario Giuseppe Garroppo, Stefano Giordano, David...
HPDC
2010
IEEE
15 years 6 months ago
BTWorld: towards observing the global BitTorrent file-sharing network
Today, the BitTorrent Peer-to-Peer file-sharing network is one of the largest Internet applications--it generates massive traffic volumes, it is deployed in thousands of independe...
Maciej Wojciechowski, Mihai Capotâ, Johan A....