Sciweavers

3319 search results - page 137 / 664
» The topology of dark networks
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 1 months ago
Mapping Semantic Networks to Undirected Networks
Abstract--There exists an injective, information-preserving function that maps a semantic network (i.e a directed labeled network) to a directed network (i.e. a directed unlabeled ...
Marko A. Rodriguez
SASN
2006
ACM
15 years 7 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
HIPC
2004
Springer
15 years 7 months ago
Design of a Robust Search Algorithm for P2P Networks
In this paper, we report a decentralized algorithm, termed ImmuneSearch, for searching p2p networks. ImmuneSearch avoids query message flooding; instead it uses an immune-systems-...
Niloy Ganguly, Geoffrey Canright, Andreas Deutsch
APNOMS
2006
Springer
15 years 5 months ago
Detecting and Identifying Network Anomalies by Component Analysis
Many research works address detection and identification of network anomalies using traffic analysis. This paper considers large topologies, such as those of an ISP, with traffic a...
Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka
DC
2008
15 years 1 months ago
Contention-free MAC protocols for asynchronous wireless sensor networks
A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of a MAC protocol are: it should be contention-free (avoid collisio...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...