Sciweavers

5516 search results - page 58 / 1104
» A Topological Approach to Recognition
Sort
View
CCS
2007
ACM
14 years 4 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
ICC
2007
IEEE
154views Communications» more  ICC 2007»
14 years 2 months ago
Topology Management in CogMesh: A Cluster-Based Cognitive Radio Mesh Network
As the radio spectrum usage paradigm shifting from the traditional command and control allocation scheme to the open spectrum allocation scheme, wireless mesh networks meet new opp...
Tao Chen, Honggang Zhang, Gian Mario Maggio, Imric...
MICS
2010
123views more  MICS 2010»
13 years 8 months ago
On the Topology of Real Algebraic Plane Curves
We revisit the problem of computing the topology and geometry of a real algebraic plane curve. The topology is of prime interest but geometric information, such as the position of...
Jinsan Cheng, Sylvain Lazard, Luis Mariano Pe&ntil...
BIOCOMP
2006
13 years 11 months ago
The Multi-Node Topological Overlap Measure For Gene Neighborhood Analysis
Defining the neighborhood of an initial set of nodes is an important task in network analysis. For example, we show that the neighborhood of an initial set of brain cancer related ...
Ai Li, Steve Horvath
IMC
2003
ACM
14 years 3 months ago
In search of path diversity in ISP networks
Internet Service Providers (ISPs) can exploit path diversity to balance load and improve robustness. Unfortunately, it is difficult to evaluate the potential impact of these appr...
Renata Teixeira, Keith Marzullo, Stefan Savage, Ge...