Sciweavers

3319 search results - page 215 / 664
» The topology of dark networks
Sort
View
KDD
2008
ACM
224views Data Mining» more  KDD 2008»
16 years 2 months ago
The structure of information pathways in a social communication network
Social networks are of interest to researchers in part because they are thought to mediate the flow of information in communities and organizations. Here we study the temporal dyn...
Gueorgi Kossinets, Jon M. Kleinberg, Duncan J. Wat...
MOBIHOC
2008
ACM
16 years 1 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
ICYCS
2008
IEEE
15 years 8 months ago
Propagation Model of Active Worms in P2P Networks
P2P worms pose heavy threatens to P2P networks. P2P worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentiall...
Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, L...
132
Voted
COLCOM
2007
IEEE
15 years 8 months ago
Message replication in unstructured peer-to-peer network
—Recently, unstructured peer-to-peer (P2P) applications have become extremely popular. Searching in these networks has been a hot research topic. Flooding-based searching, which ...
Osama Al-Haj Hassan, Lakshmish Ramaswamy
131
Voted
SECON
2007
IEEE
15 years 8 months ago
On the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference
— In this paper we study the broadcast capacity of multihop wireless networks which we define as the maximum rate at which broadcast packets can be generated in the network such...
Alireza Keshavarz-Haddad, Rudolf H. Riedi