Sciweavers

1024 search results - page 162 / 205
» Graph Based Modeling of P2P Streaming Systems
Sort
View
108
Voted
ICNP
2007
IEEE
15 years 8 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
SACMAT
2006
ACM
15 years 8 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
123
Voted
APN
2005
Springer
15 years 8 months ago
High-Level Nets with Nets and Rules as Tokens
Abstract. High-Level net models following the paradigm “nets as tokens” have been studied already in the literature with several interesting applications. In this paper we prop...
Kathrin Hoffmann, Hartmut Ehrig, Till Mossakowski
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
15 years 29 days ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...
103
Voted
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 8 months ago
Seamless Multimedia Broadcasting Over cdma2000 BCMCS Networks
— Recent advances in communication and mobile computing have made it possible for cellular networks and digital broadcasting systems to converge on the basis of their common mult...
Yongwoo Cho, Kyungtae Kang, Heonshik Shin