Sciweavers

4052 search results - page 95 / 811
» Using RDF to describe networks
Sort
View
83
Voted
CORR
2004
Springer
87views Education» more  CORR 2004»
15 years 17 days ago
Exploring tradeoffs in pleiotropy and redundancy using evolutionary computing
Evolutionary computation algorithms are increasingly being used to solve optimization problems as they have many advantages over traditional optimization algorithms. In this paper...
Matthew J. Berryman, Wei-Li Khoo, Hiep Nguyen, Eri...
84
Voted
PERCOM
2003
ACM
16 years 9 days ago
Self-Routing in Pervasive Computing Environments Using Smart Messages
Smart Messages (SMs) are dynamic collections of code and data that migrate to nodes of interest in the network and execute on these nodes. A key challenge in programming pervasive...
Cristian Borcea, Chalermek Intanagonwiwat, Akhiles...
113
Voted
ICNP
2003
IEEE
15 years 6 months ago
Improving TCP Startup Performance Using Active Measurements: Algorithm and Evaluation
TCP Slow Start exponentially increases the congestion window size to detect the proper congestion window for a network path. This often results in significant packet loss, while ...
Ningning Hu, Peter Steenkiste
ISORC
2002
IEEE
15 years 5 months ago
Using Group Communication to Support Mobile Augmented Reality Applications
Augmented reality and group communication in wireless ad-hoc networks form relatively new fields of research. When using group communication ordering and timeliness requirements ...
Niels Reijers, Raymond Cunningham, René Mei...
AINA
2008
IEEE
15 years 7 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar