Sciweavers

4998 search results - page 96 / 1000
» The case for intentional networking
Sort
View
ADHOCNOW
2007
Springer
15 years 4 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
MDM
2007
Springer
148views Communications» more  MDM 2007»
15 years 4 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
CONEXT
2010
ACM
14 years 8 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
ICCBR
2005
Springer
15 years 3 months ago
P2P Case Retrieval with an Unspecified Ontology
Traditional CBR approaches imply centralized storage of the case base and, most of them, the retrieval of similar cases by an exhaustive comparison of the case to be solved with th...
Shlomo Berkovsky, Tsvi Kuflik, Francesco Ricci
SIGIR
2006
ACM
15 years 3 months ago
Personalized recommendation driven by information flow
We propose that the information access behavior of a group of people can be modeled as an information flow issue, in which people intentionally or unintentionally influence and in...
Xiaodan Song, Belle L. Tseng, Ching-Yung Lin, Ming...