Sciweavers

2651 search results - page 44 / 531
» Mining Diversity on Networks
Sort
View
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
13 years 7 months ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...
VTC
2010
IEEE
148views Communications» more  VTC 2010»
15 years 2 months ago
Delay-Tolerant Cooperative Diversity Routing MANET
—Some mobile ad hoc networks (MANETs) such as inter-vehicle communications require a transmission scheme that is robust to mobility and asynchronous reception with low setup over...
Tian Peng Ren, Yong Liang Guan, Chau Yuen, Rong Ju...
DSN
2008
IEEE
15 years 11 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
NEW2AN
2007
Springer
15 years 10 months ago
Real Life Field Trial over a Pre-mobile WiMAX System with 4th Order Diversity
Mobile WiMAX is a promising wireless technology approaching market deployment. Much discussion concentrate on whether mobile WiMAX will reach a tipping point and become 4G or not. ...
Pål Grønsund, Paal Engelstad, Moti Ay...
121
Voted
RAID
2005
Springer
15 years 10 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...