Sciweavers

2112 search results - page 198 / 423
» Using the Network Description Language in Optical Networks
Sort
View
ATAL
2007
Springer
15 years 6 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
ICANN
2009
Springer
15 years 2 months ago
Mining Rules for the Automatic Selection Process of Clustering Methods Applied to Cancer Gene Expression Data
Different algorithms have been proposed in the literature to cluster gene expression data, however there is no single algorithm that can be considered the best one independently on...
André C. A. Nascimento, Ricardo Bastos Cava...
IFIP
2007
Springer
15 years 10 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 9 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
IM
1997
15 years 5 months ago
Immersive and Non-immersive Virtual Reality Techniques Applied to Telecommunication Network Management
In this paper, we will introduce two different three dimensional VR-based user interface for telecommunication network management. The first one is an immersive system, using HMD ...
Mohsen Kahani, H. W. Peter Beadle