Sciweavers

783 search results - page 62 / 157
» Visual analysis of network centralities
Sort
View
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 4 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
TWC
2008
87views more  TWC 2008»
14 years 9 months ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang
JITECH
2010
106views more  JITECH 2010»
14 years 8 months ago
Patterns and structures of intra-organizational learning networks within a knowledge-intensive organization
This paper employs the network perspective to study patterns and structures of intraorganizational learning networks. The theoretical background draws from cognitive theories, the...
Miha Skerlavaj, Vlado Dimovski, Kevin C. Desouza
DSN
2000
IEEE
15 years 1 months ago
Survivability Analysis of Network Specifications
Survivabilityis the ability of a system to maintain a set of essential services despite the presence of abnormal events such as faults and intrusions. Ensuring system survivabilit...
Sanjay K. Jha, Jeannette M. Wing, Richard C. Linge...
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
15 years 4 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...