Sciweavers

1278 search results - page 244 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
JNW
2006
126views more  JNW 2006»
13 years 7 months ago
Gateway Deployment optimization in Cellular Wi-Fi Mesh Networks
With the standardization of IEEE 802.11, there has been an explosive growth of wireless local area networks (WLAN). Recently, this cost effective technology is being developed aggr...
Rajesh Prasad, Hongyi Wu
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
14 years 2 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ï¬...
Marek Lipczak, Evangelos E. Milios
BMCBI
2007
133views more  BMCBI 2007»
13 years 8 months ago
Semantic integration to identify overlapping functional modules in protein interaction networks
Background: The systematic analysis of protein-protein interactions can enable a better understanding of cellular organization, processes and functions. Functional modules can be ...
Young-Rae Cho, Woochang Hwang, Murali Ramanathan, ...
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 7 months ago
Exact two-terminal reliability of some directed networks
Abstract-- The calculation of network reliability in a probabilistic context has long been an issue of practical and academic importance. Conventional approaches (determination of ...
Christian Tanguy
ALMOB
2006
109views more  ALMOB 2006»
13 years 7 months ago
A novel functional module detection algorithm for protein-protein interaction networks
Background: The sparse connectivity of protein-protein interaction data sets makes identification of functional modules challenging. The purpose of this study is to critically eva...
Woochang Hwang, Young-Rae Cho, Aidong Zhang, Mural...