Sciweavers

889 search results - page 120 / 178
» Observational Learning in Random Networks
Sort
View
126
Voted
ACSAC
2010
IEEE
14 years 4 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
100
Voted
PKDD
2005
Springer
89views Data Mining» more  PKDD 2005»
15 years 6 months ago
Community Mining from Multi-relational Networks
Abstract. Social network analysis has attracted much attention in recent years. Community mining is one of the major directions in social network analysis. Most of the existing met...
Deng Cai, Zheng Shao, Xiaofei He, Xifeng Yan, Jiaw...
ICWN
2003
15 years 1 months ago
Modeling of WLAN Beacon Signal Strength Measured in an Indoor Environment
: In the fourth generation wireless networks, it is believed that wireless LANs (WLANs) will interwork with cellular systems to provide fast speed data services. The integration of...
Wenhui Zhang
104
Voted
CORR
2008
Springer
158views Education» more  CORR 2008»
15 years 20 days ago
Distributed and Recursive Parameter Estimation in Parametrized Linear State-Space Models
We consider a network of sensors deployed to sense a spatio-temporal field and infer parameters of interest about the field. We are interested in the case where each sensor's...
S. Sundhar Ram, Venugopal V. Veeravalli, Angelia N...
ENTCS
2006
124views more  ENTCS 2006»
15 years 17 days ago
A New Rabin-type Trapdoor Permutation Equivalent to Factoring
Public key cryptography has been invented to overcome some key management problems in open networks. Although nearly all aspects of public key cryptography rely on the existence of...
Katja Schmidt-Samoa