Sciweavers

1300 search results - page 164 / 260
» Toward network data independence
Sort
View
139
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
STOC
2006
ACM
138views Algorithms» more  STOC 2006»
16 years 5 months ago
Searching dynamic point sets in spaces with bounded doubling dimension
We present a new data structure that facilitates approximate nearest neighbor searches on a dynamic set of points in a metric space that has a bounded doubling dimension. Our data...
Richard Cole, Lee-Ad Gottlieb
125
Voted
ICANN
2003
Springer
15 years 10 months ago
Supervised Locally Linear Embedding
Locally linear embedding (LLE) is a recently proposed method for unsupervised nonlinear dimensionality reduction. It has a number of attractive features: it does not require an ite...
Dick de Ridder, Olga Kouropteva, Oleg Okun, Matti ...
GRID
2006
Springer
15 years 5 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 5 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski