Sciweavers

711 search results - page 119 / 143
» Methodological frameworks for large-scale network analysis a...
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
ICRE
1998
IEEE
14 years 1 months ago
Requirements Definition for Survivable Network Systems
Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused...
Richard C. Linger, Nancy R. Mead, Howard F. Lipson
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
TMC
2010
100views more  TMC 2010»
13 years 7 months ago
Optimal Relay Station Placement in Broadband Wireless Access Networks
—To satisfy the stringent requirement of capacity enhancement in wireless networks, cooperative relaying is envisioned as one of the most effective solutions. In this paper, we s...
Bin Lin, Pin-Han Ho, Liang-Liang Xie, Xuemin (Sher...
NEUROSCIENCE
2001
Springer
14 years 1 months ago
Analysis and Synthesis of Agents That Learn from Distributed Dynamic Data Sources
We propose a theoretical framework for specification and analysis of a class of learning problems that arise in open-ended environments that contain multiple, distributed, dynamic...
Doina Caragea, Adrian Silvescu, Vasant Honavar