Sciweavers

192 search results - page 10 / 39
» Community Identification in Directed Networks
Sort
View
NSPW
2006
ACM
14 years 3 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
CONEXT
2006
ACM
14 years 1 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
BMCBI
2006
142views more  BMCBI 2006»
13 years 10 months ago
Correlated fragile site expression allows the identification of candidate fragile genes involved in immunity and associated with
Background: Common fragile sites (cfs) are specific regions in the human genome that are particularly prone to genomic instability under conditions of replicative stress. Several ...
Angela Re, Davide Corà, Alda Maria Puliti, ...
CN
2007
137views more  CN 2007»
13 years 10 months ago
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm
The success of experiences such as Seattle and Houston Wireless has attracted the attention on the so called wireless mesh community networks. These are wireless multihop networks...
Laura Galluccio, Giacomo Morabito, Sergio Palazzo,...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 4 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...