Sciweavers

3319 search results - page 255 / 664
» The topology of dark networks
Sort
View
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 6 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
BIOWIRE
2007
Springer
15 years 6 months ago
An Artificial Chemistry for Networking
Chemical computing models have been proposed since the 1980ies for expressing concurrent computations in elegant ways for shared memory systems. In this paper we look at the distri...
Thomas Meyer, Lidia Yamamoto, Christian F. Tschudi...
CONEXT
2008
ACM
15 years 3 months ago
Trellis: a platform for building flexible, fast virtual networks on commodity hardware
We describe Trellis, a platform for hosting virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topology, control protocols, and f...
Sapan Bhatia, Murtaza Motiwala, Wolfgang Mühl...
COLING
2008
15 years 3 months ago
Modeling the Structure and Dynamics of the Consonant Inventories: A Complex Network Approach
We study the self-organization of the consonant inventories through a complex network approach. We observe that the distribution of occurrence as well as cooccurrence of the conso...
Animesh Mukherjee, Monojit Choudhury, Anupam Basu,...
ICWN
2007
15 years 3 months ago
Utility-Based Divisible Sensing Task Scheduling in Wireless Sensor Networks
This paper presents a tractable optimization strategies of sensing workload scheduling in wireless sensor networks using Divisible Load Theory (DLT). Because of the limited batter...
Xiaolin Li, Xinxin Liu, Peng Guan, Hui Kang