Sciweavers

305 search results - page 23 / 61
» Reconstruction of Networks from Their Betweenness Centrality
Sort
View
ICSOC
2004
Springer
14 years 1 months ago
Implementing integrated services of networked home appliances using service oriented architecture
This paper presents a method to implement integrated services of networked home electric appliances, which provide more convenient and comfortable living for home users. The conve...
Masahide Nakamura, Hiroshi Igaki, Haruaki Tamada, ...
P2P
2005
IEEE
106views Communications» more  P2P 2005»
14 years 1 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
SODA
2004
ACM
91views Algorithms» more  SODA 2004»
13 years 9 months ago
Competitive analysis of organization networks or multicast acknowledgement: how much to wait?
We study, from the competitive analysis perspective, the trade off between communication cost and delay cost (or simply the sendor-wait dilemma) on a hierarchy (rooted tree). The p...
Carlos Brito, Elias Koutsoupias, Shailesh Vaya
TIFS
2010
130views more  TIFS 2010»
13 years 2 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
BMCBI
2008
135views more  BMCBI 2008»
13 years 8 months ago
Inferring the role of transcription factors in regulatory networks
Background: Expression profiles obtained from multiple perturbation experiments are increasingly used to reconstruct transcriptional regulatory networks, from well studied, simple...
Philippe Veber, Carito Guziolowski, Michel Le Borg...