Sciweavers

4049 search results - page 397 / 810
» Neural Network Trainer through Computer Networks
Sort
View
GROUP
2005
ACM
15 years 10 months ago
Searching for expertise in social networks: a simulation of potential strategies
People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this...
Jun Zhang, Mark S. Ackerman
143
Voted
ACSAC
2003
IEEE
15 years 10 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 8 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
152
Voted
DCOSS
2008
Springer
15 years 6 months ago
CaliBree: A Self-calibration System for Mobile Sensor Networks
We propose CaliBree, a self-calibration system for mobile wireless sensor networks. Sensors calibration is a fundamental problem in a sensor network. If sensor devices are not prop...
Emiliano Miluzzo, Nicholas D. Lane, Andrew T. Camp...
GECCO
2008
Springer
154views Optimization» more  GECCO 2008»
15 years 6 months ago
Cooperative network construction using digital germlines
This paper describes a study in the evolution of cooperative behavior, specifically the construction of communication networks, through digital evolution and multilevel selection...
David B. Knoester, Philip K. McKinley, Charles Ofr...