Now showing items 91-95 of 95
IDMA: Improving the defense against malicious attack for Mobile Ad Hoc Networks based on the ARTP protocol
Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, ...
Hybrid evolutionary computing model for mobile agents of wireless internet multimedia
The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing ...
Genetic routing algorithms to optimize availability in broadband wireless networks with load balancing
Packet-switched networks using the Internet Protocol (IP) provide multimedia services through broadband wireless access to mobile and fixed subscribers from an IP core network via bi-directional paths consisting of a ...
Learning implicit user interest hierarchy for context in personalization
To provide a more robust context for personalization, we desire to extract a continuum of general (long-term) to specific (short-term) interests of a user. Our proposed approach is to learn a user interest hierarchy (UIH) ...
An algorithm applicable to clearing combinatorial exchanges
It is important to approach negotiations in a way that ensures privacy. So far, research has focused on securely solving restricted classes of negotiation techniques, mainly the (M+1)-st-price auctions. Here we show how ...