Sciweavers

4052 search results - page 359 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
IEEEIAS
2007
IEEE
15 years 11 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
COMCOM
2011
14 years 12 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
162
Voted
IMC
2009
ACM
15 years 11 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
204
Voted
ETVC
2008
15 years 6 months ago
Statistical Computing on Manifolds: From Riemannian Geometry to Computational Anatomy
Computational anatomy is an emerging discipline that aims at analyzing and modeling the individual anatomy of organs and their biological variability across a population. The goal ...
Xavier Pennec
IEEESP
2011
14 years 8 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...