Sciweavers

1748 search results - page 25 / 350
» Security Models for Heterogeneous Networking
Sort
View
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
16 years 8 days ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han
ICSE
2003
IEEE-ACM
15 years 11 months ago
DADO: Enhancing Middleware to Support Crosscutting Features in Distributed, Heterogeneous Systems
Some "non-' or "extra-functional" features, such as reliability, security, and tracing, defy modularization mechanisms in programming languages. This makes suc...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
ADHOCNOW
2008
Springer
15 years 26 days ago
A Novel Mobility Model from a Heterogeneous Military MANET Trace
In this paper we describe our analysis of a real trace and propose a mobility model. The trace data we used for this study was collected from a military experiment carried out in L...
Xiaofeng Lu, Yung-chih Chen, Ian X. Y. Leung, Zhan...
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
15 years 1 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
IPPS
2009
IEEE
15 years 6 months ago
Validating Wrekavoc: A tool for heterogeneity emulation
Experimental validation and testing of solutions designed for heterogeneous environment is a challenging issue. Wrekavoc is a tool for performing such validation. It runs unmodiï¬...
Olivier Dubuisson, Jens Gustedt, Emmanuel Jeannot