Sciweavers

231 search results - page 9 / 47
» Authentication across heterogeneous networks
Sort
View
ORGSCI
2010
78views more  ORGSCI 2010»
14 years 8 months ago
Heterogeneity, Brokerage, and Innovative Performance: Endogenous Formation of Collaborative Inventor Networks
In this study I examine how past performance influences the relative positions of actors in a network and how the actor-level heterogeneity in quality mediates the often-demonstra...
Jeongsik "Jay" Lee
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
15 years 10 months ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han
ISCA
2011
IEEE
258views Hardware» more  ISCA 2011»
14 years 1 months ago
A case for heterogeneous on-chip interconnects for CMPs
Network-on-chip (NoC) has become a critical shared resource in the emerging Chip Multiprocessor (CMP) era. Most prior NoC designs have used the same type of router across the enti...
Asit K. Mishra, Narayanan Vijaykrishnan, Chita R. ...
IAJIT
2010
87views more  IAJIT 2010»
14 years 8 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
ETFA
2005
IEEE
15 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver