Sciweavers

1748 search results - page 119 / 350
» Security Models for Heterogeneous Networking
Sort
View
WWW
2010
ACM
15 years 10 months ago
Modeling relationship strength in online social networks
Previous work analyzing social networks has mainly focused on binary friendship relations. However, in online social networks the low cost of link formation can lead to networks w...
Rongjing Xiang, Jennifer Neville, Monica Rogati
JSAC
2010
104views more  JSAC 2010»
15 years 2 months ago
A priority-based processor sharing model for TDM passive optical networks
—The use of passive optical networks (PONs) enables access rates of multi-Gbit/sec bandwidth and provision of quality of service for high definition multimedia services. In this...
Yan Wang, Moshe Zukerman, Ron Addie, Sammy Chan, R...
148
Voted
INDOCRYPT
2004
Springer
15 years 9 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
151
Voted
BIBE
2007
IEEE
149views Bioinformatics» more  BIBE 2007»
15 years 7 months ago
XML Encoding of Features Describing Rule-Based Modeling of Reaction Networks with Multi-Component Molecular Complexes
Multi-state molecules and multi-component complexes are commonly involved in cellular signaling. Accounting for molecules that have multiple potential states, such as a protein tha...
Michael L. Blinov, Ion I. Moraru
140
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 10 months ago
Modelling Interference Temperature Constraints for Spectrum Access in Cognitive Radio Networks
— With the advent of cognitive radio technology, new paradigms for spectrum access can achieve near-optimal spectrum utilisation by letting each user sense and utilise available s...
Joe Bater, Hwee Pink Tan, Kenneth N. Brown, Linda ...