Sciweavers

209 search results - page 39 / 42
» Sensor Network Configuration Under Physical Attacks
Sort
View
CORR
2002
Springer
156views Education» more  CORR 2002»
14 years 9 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
INTERNET
2002
142views more  INTERNET 2002»
14 years 9 months ago
Mapping the Gnutella Network
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Adriana Iamnitchi, Ian T. Foster
LISA
1994
14 years 11 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
14 years 10 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
IM
2008
14 years 9 months ago
Directed Random Dot Product Graphs
In this paper we consider three models for random graphs that utilize the inner product as their fundamental object. We analyze the behavior of these models with respect to cluster...
Stephen J. Young, Edward R. Scheinerman