Sciweavers

415 search results - page 25 / 83
» System Level Simulation of LTE Networks
Sort
View
TROB
2008
113views more  TROB 2008»
14 years 9 months ago
Occam's Razor Applied to Network Topology Inference
We present a method for inferring the topology of a sensor network given nondiscriminating observations of activity in the monitored region. This is accomplished based on no prior ...
Dimitri Marinakis, Gregory Dudek
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
14 years 7 months ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos
IEEECIT
2010
IEEE
14 years 8 months ago
Incorporating Trust in Network Virtualization
In this paper, we propose a trust management framework for network virtualization environments. The proposed framework helps distinguish among the infrastructure providers based o...
Loubna Mekouar, Youssef Iraqi, Raouf Boutaba
SACMAT
2003
ACM
15 years 2 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
ICPADS
2007
IEEE
15 years 3 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera