Sciweavers

35416 search results - page 7015 / 7084
» Evaluation
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 3 months ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou
CORR
2011
Springer
217views Education» more  CORR 2011»
14 years 3 months ago
Coarse-Grained Topology Estimation via Graph Sampling
Many online networks are measured and studied via sampling techniques, which typically collect a relatively small fraction of nodes and their associated edges. Past work in this a...
Maciej Kurant, Minas Gjoka, Yan Wang, Zack W. Almq...
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 3 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 3 months ago
Fundamentals of Inter-cell Overhead Signaling in Heterogeneous Cellular Networks
Heterogeneous base stations (e.g. picocells, microcells, femtocells and distributed antennas) will become increasingly essential for cellular network capacity and coverage. Up unt...
Ping Xia, Han-Shin Jo, Jeffrey G. Andrews
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 3 months ago
Searching for Bayesian Network Structures in the Space of Restricted Acyclic Partially Directed Graphs
Although many algorithms have been designed to construct Bayesian network structures using different approaches and principles, they all employ only two methods: those based on i...
Silvia Acid, Luis M. de Campos
« Prev « First page 7015 / 7084 Last » Next »