Sciweavers

3343 search results - page 140 / 669
» Network Objects
Sort
View
NDSS
2008
IEEE
14 years 3 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
P2P
2009
IEEE
155views Communications» more  P2P 2009»
14 years 3 months ago
ModelNet: Towards a DataCenter Emulation Environment
—ModelNet is a network emulator designed for repeatable, large-scale experimentation with real networked systems. This talk introduces the ideas behind ModelNet that have made it...
Kashi Venkatesh Vishwanath, Amin Vahdat, Ken Yocum...
IV
2010
IEEE
214views Visualization» more  IV 2010»
13 years 7 months ago
The Network Lens: Interactive Exploration of Multivariate Networks Using Visual Filtering
—Networks are widely used in modeling relational data often comprised of thousands of nodes and edges. This kind of data alone implies a challenge for its visualization as it is ...
Ilir Jusufi, Yang Dingjie, Andreas Kerren
ICAT
2003
IEEE
14 years 2 months ago
Hierarchical QoS Architecture for Networked Virtual Dancing Environment
In this paper, we present the hierarchical QoS architecture for the virtual dancing environment. In this system, geographically distributed users share the virtual dancing hall an...
Jin Ryong Kim, Youjip Won, Beomeun Kim
GLOBECOM
2006
IEEE
14 years 3 months ago
Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks
— Global flooding and expanding ring search are two commonly used methods in search for an interested object in multi-hop wireless networks. While global flooding is simple, it...
Kui Wu, Hong-Chuan Yang, Fulu Li