Sciweavers

147 search results - page 23 / 30
» Propagation Model of Active Worms in P2P Networks
Sort
View
CCS
2006
ACM
13 years 11 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
INFOCOM
2009
IEEE
14 years 2 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
IJIT
2004
13 years 8 months ago
Mobile Robot Navigation Using Local Model Networks
Developing techniques for mobile robot navigation constitutes one of the major trends in the current research on mobile robotics. This paper develops a local model network (LMN) fo...
Hamdi A. Awad, Mohamed A. Al-Zorkany
NN
2007
Springer
103views Neural Networks» more  NN 2007»
13 years 7 months ago
Emergence of sequence sensitivity in a hippocampal CA3-CA1 model
Recent studies have shown that place cells in the hippocampal CA1 region fire in a sequence sensitive manner. In this study we tested if hippocampal CA3 and CA1 regions can give ...
Motoharu Yoshida, Hatsuo Hayashi
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
13 years 5 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...