Sciweavers

1300 search results - page 185 / 260
» Toward network data independence
Sort
View
96
Voted
ICCS
2007
Springer
15 years 6 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
121
Voted
WCNC
2010
IEEE
15 years 4 months ago
Radio Resource Management in OFDMA-Based Cellular Networks Enhanced with Fixed and Nomadic Relays
—The provision of very high data rates in a ubiquitous manner throughout the service area is a great challenge for 4G and beyond-4G wireless networks. Towards that end, the deplo...
Mohamed Salem, Abdulkareem Adinoyi, Halim Yanikome...
116
Voted
TWC
2008
154views more  TWC 2008»
15 years 15 days ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
101
Voted
ICAPR
2005
Springer
15 years 6 months ago
GP Ensemble for Distributed Intrusion Detection Systems
In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multiisland model-based environment to monitor security...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
111
Voted
SEMWEB
2001
Springer
15 years 5 months ago
An RDF Framework for Resource Discovery
Resource discovery is a problem common to almost all distributed systems. Instead of resulting in a one or a small number of discovery mechanisms, completely different and incompa...
Franklin Reynolds