Sciweavers

36 search results - page 6 / 8
» Secret Key Generation for a Pairwise Independent Network Mod...
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 2 days ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
NAACL
2003
13 years 7 months ago
Automatic Extraction of Semantic Networks from Text using Leximancer
Leximancer is a software system for performing conceptual analysis of text data in a largely language independent manner. The system is modelled on Content Analysis and provides u...
Andrew E. Smith
JAMIA
2011
94views more  JAMIA 2011»
12 years 8 months ago
Protein-network modeling of prostate cancer gene signatures reveals essential pathways in disease recurrence
Objective Uncovering the dominant molecular deregulation among the multitude of pathways implicated in aggressive prostate cancer is essential to intelligently developing targeted...
James L. Chen, Jianrong Li, Walter M. Stadler, Yve...
NDSS
2003
IEEE
13 years 11 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the server...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
CN
2008
98views more  CN 2008»
13 years 5 months ago
Description and simulation of dynamic mobility networks
During the last decade, the study of large scale complex networks has attracted a substantial amount of attention and works from several domains: sociology, biology, computer scie...
Antoine Scherrer, Pierre Borgnat, Eric Fleury, Jea...