Sciweavers

21 search results - page 2 / 5
» Secure Routing Based on Social Similarity in Opportunistic N...
Sort
View
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
13 years 11 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
VTC
2006
IEEE
154views Communications» more  VTC 2006»
13 years 10 months ago
OS-multicast: On-demand Situation-aware Multicasting in Disruption Tolerant Networks
—Disruption Tolerant Networks (DTNs) are emerging solutions to networks that experience frequent network partitions and large end-to-end delays. In this paper, we study how to pr...
Qing Ye, Liang Cheng, Mooi Choo Chuah, Brian D. Da...
CCS
2009
ACM
14 years 5 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
INFOCOM
2009
IEEE
13 years 11 months ago
Fair Routing in Delay Tolerant Networks
—The typical state-of-the-art routing algorithms for delay tolerant networks are based on best next hop hill-climbing heuristics in order to achieve throughput and efficiency. T...
Josep M. Pujol, Alberto Lopez Toledo, Pablo Rodrig...
SOUPS
2010
ACM
13 years 8 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill