Sciweavers

1331 search results - page 118 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
CORR
2010
Springer
130views Education» more  CORR 2010»
14 years 8 months ago
Spectral methods for the detection of network community structure: a comparative analysis
Spectral analysis has been successfully applied to the detection of community structure of networks, respectively being based on the adjacency matrix, the standard Laplacian matrix...
Hua-Wei Shen, Xue-Qi Cheng
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
APWEB
2008
Springer
14 years 11 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang
EUROPAR
2007
Springer
15 years 4 months ago
On the Connectivity of Bluetooth-Based Ad Hoc Networks
We study the connectivity properties of a family of random graphs which closely model the Bluetooth’s device discovery process, where each device tries to connect to other device...
Pilu Crescenzi, Carlo Nocentini, Andrea Pietracapr...
DIALM
2004
ACM
165views Algorithms» more  DIALM 2004»
15 years 3 months ago
LLS: a locality aware location service for mobile ad hoc networks
Coping with mobility and dynamism is one of the biggest challenges in ad hoc networks. An essential requirement for such networks is a service that can establish communication ses...
Ittai Abraham, Danny Dolev, Dahlia Malkhi