Sciweavers

1583 search results - page 100 / 317
» The Quorum Deployment Problem
Sort
View
ENTCS
2007
110views more  ENTCS 2007»
15 years 3 months ago
Algorithmic Techniques for Maintaining Shortest Routes in Dynamic Networks
In this paper, we survey algorithms for shortest paths in dynamic networks. Although research on this problem spans over more than three decades, in the last couple of years many ...
Camil Demetrescu, Giuseppe F. Italiano
JOT
2007
113views more  JOT 2007»
15 years 3 months ago
Pattern-Oriented Design for Multi-Agent System: A Conceptual Model
Design patterns represent solutions to specific problem of developing one application that have evolved over time. They leverage the reuse level to the design phase by providing a...
Radziah Mohamad, Safaai Deris, Hany H. Ammar
176
Voted
CSSE
2004
IEEE
15 years 3 months ago
Trustable B2C markets on the semantic web
Abstract. Semantic Web technologies will deeply influence the further development of the Internet Economy. A major challenge is, however, to find a practical solution for trust pro...
Robert Tolksdorf, Christian Bizer, Rainer Eckstein...
141
Voted
ISI
2008
Springer
15 years 1 months ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
139
Voted
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
15 years 1 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...