Sciweavers

6110 search results - page 149 / 1222
» Graceful Network Operations
Sort
View
112
Voted
CANS
2009
Springer
169views Cryptology» more  CANS 2009»
15 years 7 months ago
Privacy-Preserving Relationship Path Discovery in Social Networks
As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites ov...
Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Pa...
103
Voted
SEMWEB
2009
Springer
15 years 7 months ago
Analysis of a Real Online Social Network Using Semantic Web Frameworks
Abstract. Social Network Analysis (SNA) provides graph algorithms to characterize the structure of social networks, strategic positions in these networks, specific sub-networks and...
Guillaume Erétéo, Michel Buffa, Fabi...
72
Voted
ISCAS
2007
IEEE
131views Hardware» more  ISCAS 2007»
15 years 7 months ago
2-MITE Product-of-Power-Law Networks
— A 2-MITE is a multiple-input translinear element with two input gates. In this paper, different properties of networks of 2-MITEs are derived, especially in the case of product...
Shyam Subramanian, David V. Anderson
82
Voted
APNOMS
2007
Springer
15 years 7 months ago
Measurement Analysis of IP-Based Process Control Networks
This paper presents a measurement study of the traffic traces from the industrial process control IP networks. We present some interesting and unique traffic characteristics of the...
Young J. Won, Mi-Jung Choi, Myung-Sup Kim, Hong-Su...
85
Voted
INFOCOM
1997
IEEE
15 years 5 months ago
Performance of Multicasting Closed Interconnection Networks
This paper examines the application of a simple yet general packet replication scheme to achieve multicasting in closed interconnection networks. The performance of these networks...
Cathy W. Chan, Soung C. Liew