Sciweavers

3810 search results - page 624 / 762
» Using mobile agents for network performance management
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 5 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
KBSE
2002
IEEE
15 years 10 months ago
Report on the Workshop on the State of the Art in Automated Software Engineering
ort gives their abstracts. s of the position papers Recent Experiences with Code Generation and Task Automation Agents in Software Tools (J. Grundy, J. Hosking) As software grows i...
Yves Ledru, David F. Redmiles
187
Voted
SUTC
2006
IEEE
15 years 11 months ago
Energy Efficient Sleep Schedule for Achieving Minimum Latency in Query based Sensor Networks
Energy management in sensor networks is crucial to prolong the network lifetime. Though existing sleep scheduling algorithms save energy, they lead to a large increase in end-to-e...
N. A. Vasanthi, S. Annadurai
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 10 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
KDD
2009
ACM
216views Data Mining» more  KDD 2009»
16 years 6 months ago
Finding a team of experts in social networks
Given a task T , a pool of individuals X with different skills, and a social network G that captures the compatibility among these individuals, we study the problem of finding X ,...
Theodoros Lappas, Kun Liu, Evimaria Terzi