Sciweavers

2316 search results - page 405 / 464
» How Asymmetric Is the Internet
Sort
View

Publication
116views
15 years 4 months ago
Poking Facebook: Characterization of OSN Applications
Facebook is one of the most popular Internet sites today. A key fea- ture that arguably contributed to Facebook's unprecedented success is its application platform, which enab...
Minas Gjoka, Michael Sirivianos, Athina Markopoulo...
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 4 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
DATAMINE
2010
120views more  DATAMINE 2010»
15 years 4 months ago
A weighted voting summarization of SOM ensembles
Abstract Weighted Voting Superposition (WeVoS) is a novel summarization algorithm for the results of an ensemble of Self-Organizing Maps. Its principal aim is to achieve the lowest...
Bruno Baruque, Emilio Corchado
CCR
2006
116views more  CCR 2006»
15 years 4 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 4 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...