Sciweavers

702 search results - page 89 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
IMC
2004
ACM
15 years 3 months ago
Modeling distances in large-scale networks by matrix factorization
In this paper, we propose a model for representing and predicting distances in large-scale networks by matrix factorization. The model is useful for network distance sensitive app...
Yun Mao, Lawrence K. Saul
IV
2006
IEEE
111views Visualization» more  IV 2006»
15 years 3 months ago
Mapping Scientific Disciplines and Author Expertise Based on Personal Bibliography Files
This paper presents a novel approach (1) to define, analyze, and map a scientific discipline and (2) to compare and map the expertise of single authors based on personal bibliogra...
Colin Murray, Weimao Ke, Katy Börner
WETICE
2007
IEEE
15 years 4 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
CCR
2006
76views more  CCR 2006»
14 years 9 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
DASC
2006
IEEE
15 years 3 months ago
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
Abstract— This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication perform...
Philip K. McKinley, Farshad A. Samimi, Jonathan K....