Sciweavers

595 search results - page 88 / 119
» New architecture for intra-domain network security issues
Sort
View
IPPS
2009
IEEE
15 years 8 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...
PR
2006
78views more  PR 2006»
15 years 1 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
112
Voted
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 8 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
TMC
2010
115views more  TMC 2010»
15 years 6 days ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
RTAS
2005
IEEE
15 years 7 months ago
VPN Gateways over Network Processors: Implementation and Evaluation
Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, ...
Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-C...