Sciweavers

296 search results - page 31 / 60
» Bipartite Graphs as Models of Complex Networks
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
PODC
2005
ACM
15 years 5 months ago
On the locality of bounded growth
Many large-scale networks such as ad hoc and sensor networks, peer-to-peer networks, or the Internet have the property that the number of independent nodes does not grow arbitrari...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
VRST
1997
ACM
15 years 4 months ago
Modeling and rendering of outdoor scenes for distributed virtual environments
Abstract. We present an approach for modeling and realtime rendering of outdoor scenes, for use in virtual reality applications such as flight simulators and multi-user virtual env...
Dieter Schmalstieg, Michael Gervautz
IFIPTCS
2010
14 years 9 months ago
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be...
Arnaud Casteigts, Paola Flocchini, Bernard Mans, N...
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 12 months ago
Expansion and Search in Networks
Borrowing from concepts in expander graphs, we study the expansion properties of real-world, complex networks (e.g. social networks, unstructured peer-to-peer or P2P networks) and...
Arun S. Maiya, Tanya Y. Berger-Wolf