Sciweavers

5234 search results - page 693 / 1047
» Simulation of Computer Network Attacks
Sort
View
MOBICOM
1999
ACM
15 years 9 months ago
Analysis of TCP Performance over Mobile Ad Hoc Networks
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile computing devices regardless of physical location. Recent r...
Gavin Holland, Nitin H. Vaidya
DEXA
2006
Springer
113views Database» more  DEXA 2006»
15 years 8 months ago
Dynamic Range Query in Spatial Network Environments
Moving range queries over mobile objects are important in many location management applications. There have been quite a few research works in this area. However, all existing solu...
Fuyu Liu, Tai T. Do, Kien A. Hua
BCSHCI
2007
15 years 6 months ago
"The devil you know knows best": how online recommendations can benefit from social networking
The defining characteristic of the Internet today is an abundance of information and choice. Recommender Systems (RS), designed to alleviate this problem, have so far not been ver...
Philip Bonhard, Martina Angela Sasse, Clare Harrie...
ADVCS
2008
140views more  ADVCS 2008»
15 years 5 months ago
Reputation for Innovating Social Networks
Reputation is a fundamental instrument of partner selection. Developed within the domain of electronic auctions, reputation technology is being been imported into other applicatio...
Rosaria Conte, Mario Paolucci, Jordi Sabater-Mir
FGCS
2006
87views more  FGCS 2006»
15 years 5 months ago
Task distribution with a random overlay network
We consider a model where commodity service providers are offering commodity computational services to a set of customers. We provide a solution for the efficient distribution of ...
Ladislau Bölöni, Damla Turgut, Dan C. Ma...