Sciweavers

5114 search results - page 198 / 1023
» Complex networks
Sort
View
TMA
2010
Springer
314views Management» more  TMA 2010»
14 years 5 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
14 years 4 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
IPCCC
2005
IEEE
14 years 4 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
ACSC
2006
IEEE
14 years 4 months ago
Trust network analysis with subjective logic
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formali...
Audun Jøsang, Ross Hayward, Simon Pope
PCI
2005
Springer
14 years 4 months ago
NGCE - Network Graphs for Computer Epidemiologists
Abstract. Graphs are useful data structures capable of efficiently representing a variety of technological and social networks. They are therefore utilized in simulation-based stud...
Vasileios Vlachos, Vassiliki Vouzi, Damianos Chatz...