Sciweavers

7587 search results - page 1295 / 1518
» Network Analysis and Visualisation
Sort
View
ICDM
2008
IEEE
401views Data Mining» more  ICDM 2008»
14 years 4 months ago
Graph OLAP: Towards Online Analytical Processing on Graphs
OLAP (On-Line Analytical Processing) is an important notion in data analysis. Recently, more and more graph or networked data sources come into being. There exists a similar need ...
Chen Chen, Xifeng Yan, Feida Zhu, Jiawei Han, Phil...
NDSS
2008
IEEE
14 years 4 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ACISP
2008
Springer
14 years 4 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
BROADNETS
2007
IEEE
14 years 4 months ago
TCP dynamics over IEEE 802.11E WLANs: Modeling and throughput enhancement
— Today, IEEE 802.11 Wireless LAN (WLAN) has become a prevailing solution for broadband wireless Internet access while Transport Control Protocol (TCP) is the dominant transport ...
Jeonggyun Yu, Sunghyun Choi, Daji Qiao
LOCA
2007
Springer
14 years 3 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
« Prev « First page 1295 / 1518 Last » Next »