Sciweavers

5114 search results - page 198 / 1023
» Complex networks
Sort
View
TMA
2010
Springer
314views Management» more  TMA 2010»
15 years 10 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
151
Voted
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
15 years 9 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
IPCCC
2005
IEEE
15 years 9 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
ACSC
2006
IEEE
15 years 10 months ago
Trust network analysis with subjective logic
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formali...
Audun Jøsang, Ross Hayward, Simon Pope
PCI
2005
Springer
15 years 9 months ago
NGCE - Network Graphs for Computer Epidemiologists
Abstract. Graphs are useful data structures capable of efficiently representing a variety of technological and social networks. They are therefore utilized in simulation-based stud...
Vasileios Vlachos, Vassiliki Vouzi, Damianos Chatz...