Sciweavers

5056 search results - page 307 / 1012
» Network Coding Theory
Sort
View
CSREASAM
2007
15 years 5 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham
GPC
2009
Springer
15 years 1 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
IJCNN
2006
IEEE
15 years 9 months ago
Improvement of an Artificial Neural Network Model using Min-Max Preprocessing for the Prediction of Wave-induced Seabed Liquefac
—In the past decade, artificial neural networks (ANNs) have been widely applied to the engineering problems with a complicated system. ANNs are becoming an important alternative ...
Deaho Cha, Michael Blumenstein, Hong Zhang, Dong-S...
SIROCCO
2008
15 years 5 months ago
Word of Mouth: Rumor Dissemination in Social Networks
In this paper we examine the diffusion of competing rumors in social networks. Two players select a disjoint subset of nodes as initiators of the rumor propagation, seeking to maxi...
Jan Kostka, Yvonne Anne Oswald, Roger Wattenhofer
ICMLA
2004
15 years 5 months ago
Outlier detection and evaluation by network flow
Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, su...
Ying Liu, Alan P. Sprague