Sciweavers

2672 search results - page 130 / 535
» Testing Self-Similar Networks
Sort
View
UIC
2009
Springer
15 years 10 months ago
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...
Jun-Ki Min, Su-Hyung Jang, Sung-Bae Cho
WEBI
2009
Springer
15 years 10 months ago
Revealing Hidden Community Structures and Identifying Bridges in Complex Networks: An Application to Analyzing Contents of Web P
The emergence of scale free and small world properties in real world complex networks has stimulated lots of activity in the field of network analysis. An example of such a netwo...
Faraz Zaidi, Arnaud Sallaberry, Guy Melanço...
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 10 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
ICANN
2007
Springer
15 years 10 months ago
Biasing Neural Networks Towards Exploration or Exploitation Using Neuromodulation
Abstract. Taking neuromodulation as a mechanism underlying emotions, this paper investigates how such a mechanism can bias an artificial neural network towards exploration of new ...
Karla Parussel, Lola Cañamero
ACSAC
2006
IEEE
15 years 10 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski