Sciweavers

4962 search results - page 93 / 993
» Connectivity in Sub-Poisson Networks
Sort
View
168
Voted
IAW
2003
IEEE
15 years 10 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
141
Voted
JNW
2010
69views more  JNW 2010»
15 years 3 months ago
On Local CAC Schemes for Scalability of High-speed Networks
Next generation networks are required to provide bandwidth on-demand for fine granularity sessions. In this sense, centralized CAC (Connection Admission Control) approaches could ...
Javier Aracil, José Alberto Hernánde...
ICSE
2009
IEEE-ACM
15 years 11 months ago
Codebook: Social networking over code
Social networking systems help people maintain connections to their friends, enabling awareness, communication, and collaboration, especially at a distance. In many studies of coo...
Andrew Begel, Robert DeLine
HICSS
2000
IEEE
144views Biometrics» more  HICSS 2000»
15 years 9 months ago
Diffusion Follows Structure - A Network Model of the Software
By conducting simulations, we show that the structure of the personal networks significantly influences the diffusion processes in network effect markets like the software market....
Falk von Westarp, Oliver Wendt
PERCOM
2005
ACM
16 years 4 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao