Sciweavers

77 search results - page 10 / 16
» Identity and Identification in a Networked World
Sort
View
CMS
2006
158views Communications» more  CMS 2006»
13 years 10 months ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...
IJCSA
2007
99views more  IJCSA 2007»
13 years 8 months ago
Wing Pattern-Based Classification of the Rhagoletis pomonella Species Complex Using Genetic Neural Networks
The Rhagoletis pomonella species complex consists of at least four sibling species. They are highly host specific as larvae, and display great fidelity as adults. The only certain...
Chengpeng Bi, Michael C. Saunders, Bruce A. McPher...
PERCOM
2006
ACM
14 years 8 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
RECOMB
2006
Springer
14 years 9 months ago
Assessing Significance of Connectivity and Conservation in Protein Interaction Networks
Computational and comparative analysis of protein-protein interaction (PPI) networks enable understanding of the modular organization of the cell through identification of functio...
Mehmet Koyutürk, Ananth Grama, Wojciech Szpan...
GROUP
2009
ACM
14 years 3 months ago
All My People Right Here, Right Now: management of group co-presence on a social networking site
A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individua...
Airi Lampinen, Sakari Tamminen, Antti Oulasvirta