Sciweavers

730 search results - page 88 / 146
» Reflections on network architecture: an active networking pe...
Sort
View
COMAD
2009
15 years 28 days ago
Trust-Based Infinitesimals for Enhanced Collaborative Filtering
In this paper we propose a novel recommender system which enhances user-based collaborative filtering by using a trust-based social network. Our main idea is to use infinitesimal ...
Maria Chowdhury, Alex Thomo, William W. Wadge
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
15 years 4 months ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel
DANCE
2002
IEEE
15 years 4 months ago
Towards Self-Configuring Networks
Current networks require ad-hoc operating procedures by expert administrators to handle changes. These configuration management operations are costly and error prone. Active netwo...
Alexander V. Konstantinou, Danilo Florissi, Yechia...
IJNSEC
2006
205views more  IJNSEC 2006»
14 years 11 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
TELETRAFFIC
2007
Springer
15 years 6 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan