Sciweavers

1300 search results - page 164 / 260
» Toward network data independence
Sort
View
104
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
105
Voted
STOC
2006
ACM
138views Algorithms» more  STOC 2006»
16 years 29 days ago
Searching dynamic point sets in spaces with bounded doubling dimension
We present a new data structure that facilitates approximate nearest neighbor searches on a dynamic set of points in a metric space that has a bounded doubling dimension. Our data...
Richard Cole, Lee-Ad Gottlieb
92
Voted
ICANN
2003
Springer
15 years 5 months ago
Supervised Locally Linear Embedding
Locally linear embedding (LLE) is a recently proposed method for unsupervised nonlinear dimensionality reduction. It has a number of attractive features: it does not require an ite...
Dick de Ridder, Olga Kouropteva, Oleg Okun, Matti ...
126
Voted
GRID
2006
Springer
15 years 20 days ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
107
Voted
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 21 days ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski