Sciweavers

1737 search results - page 103 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
NAACL
2003
15 years 1 months ago
Automatic Extraction of Semantic Networks from Text using Leximancer
Leximancer is a software system for performing conceptual analysis of text data in a largely language independent manner. The system is modelled on Content Analysis and provides u...
Andrew E. Smith
ISI
2008
Springer
14 years 11 months ago
A locality model of the evolution of blog networks
We present a model of evolution of large social networks. Our model is based on the local nature of communication: a node's communication energy is spend mostly within it'...
Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kel...
GLOBECOM
2006
IEEE
15 years 6 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
15 years 6 months ago
Delta Hedging Energy Portfolios: an Exploratory Study
1 Delta hedging, although widely used in commodity markets, needs to be further adapted to electricity markets. Given the extreme volatility of electricity prices, even a portfolio...
Richard Goldberg, James Read, Art Altman, Remi Aud...
MOBIHOC
2008
ACM
15 years 11 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao