Sciweavers

1846 search results - page 108 / 370
» Geographically-Sensitive Link Analysis
Sort
View
EGOV
2011
Springer
14 years 4 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson
WWW
2006
ACM
16 years 5 months ago
An integrated method for social network extraction
A social network can become bases for information infrastructure in the future. It is important to extract social networks that are not biased. Providing a simple means for users ...
Tom Hope, Takuichi Nishimura, Hideaki Takeda
AINA
2009
IEEE
15 years 11 months ago
Opportunistic Routing for Disruption Tolerant Networks
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
Marcello Caleffi, Luigi Paura
SAINT
2007
IEEE
15 years 10 months ago
On the Effect of Scale-Free Structure of Network Topology on End-to-End Performance
In recent years, it has been reported that several existing networks including the Internet have scale-free structure. In this paper, through a simple numerical analysis, we inves...
Hiroyuki Ohsaki, Koutaro Yagi, Makoto Imase
DSD
2006
IEEE
126views Hardware» more  DSD 2006»
15 years 10 months ago
Off-Line Testing of Delay Faults in NoC Interconnects
Testing of high density SoCs operating at high clock speeds is an important but difficult problem. Many faults, like delay faults, in such sub-micron chips may only appear when th...
Tomas Bengtsson, Artur Jutman, Shashi Kumar, Raimu...