Sciweavers

1300 search results - page 111 / 260
» Toward network data independence
Sort
View
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 4 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
124
Voted
WINET
2010
179views more  WINET 2010»
14 years 11 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
INFOCOM
2008
IEEE
15 years 7 months ago
Is Random Network Coding Helpful in WiMAX?
—The IEEE 802.16 standard, or WiMAX, has emerged to facilitate high-bandwidth wireless access in realworld metropolitan areas, commonly referred to as 4G. In WiMAX, Hybrid Automa...
Jin Jin, Baochun Li, Taegon Kong
118
Voted
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
15 years 6 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
101
Voted
CDC
2009
IEEE
179views Control Systems» more  CDC 2009»
15 years 5 months ago
Bayesian network approach to understand regulation of biological processes in cyanobacteria
— Bayesian networks have extensively been used in numerous fields including artificial intelligence, decision theory and control. Its ability to utilize noisy and missing data ...
Thanura R. Elvitigala, Abhay K. Singh, Himadri B. ...