Sciweavers

2912 search results - page 320 / 583
» Overlay Networks - Implementation by Specification
Sort
View
AAAI
2010
15 years 5 months ago
The Genetic Algorithm as a General Diffusion Model for Social Networks
Diffusion processes taking place in social networks are used to model a number of phenomena, such as the spread of human or computer viruses, and the adoption of products in `vira...
Mayank Lahiri, Manuel Cebrián
CCR
2010
169views more  CCR 2010»
15 years 4 months ago
On the leakage of personally identifiable information via online social networks
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity ...
Balachander Krishnamurthy, Craig E. Wills
CORR
2008
Springer
90views Education» more  CORR 2008»
15 years 4 months ago
A computationally-efficient construction for the matrix-based key distribution in sensor network
Key pre-distribution in wireless sensor network is aimed at delivering keys to sensor networks at the low expense of computation, communication, and memory while providing a high d...
Abedelaziz Mohaisen
ENTCS
2006
175views more  ENTCS 2006»
15 years 4 months ago
Observing Internet Worm and Virus Attacks with a Small Network Telescope
A network telescope is a portion of the IP address space which is devoted to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious ...
Uli Harder, Matt W. Johnson, Jeremy T. Bradley, Wi...
ITIIS
2008
158views more  ITIIS 2008»
15 years 4 months ago
Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks
Nowadays, wireless packet data services are provided over Wireless MAN (WMAN) at a high data service rate, while 3G cellular networks provide wide-area coverage at a low data serv...
Jaeho Jo, Jinsung Cho