: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Abstract. Social network analysis has attracted much attention in recent years. Community mining is one of the major directions in social network analysis. Most of the existing met...
Deng Cai, Zheng Shao, Xiaofei He, Xifeng Yan, Jiaw...
The vision of Semantic Web services promises a network of interoperable Web services over different sources. A major challenge to the realization of this vision is the lack of aut...
Wensheng Wu, AnHai Doan, Clement T. Yu, Weiyi Meng
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...