Sciweavers

901 search results - page 172 / 181
» Secure Internet Applications Based on Mobile Agents
Sort
View
IMC
2009
ACM
14 years 2 months ago
Scalable proximity estimation and link prediction in online social networks
Proximity measures quantify the closeness or similarity between nodes in a social network and form the basis of a range of applications in social sciences, business, information t...
Han Hee Song, Tae Won Cho, Vacha Dave, Yin Zhang, ...
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 9 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
CCR
2004
93views more  CCR 2004»
13 years 7 months ago
Enabling large-scale wireless broadband: the case for TAPs
Abstract-- The vision is tantalizing: a high-performance, scalable, and widely deployed wireless Internet that facilitates services ranging from radically new and unforeseen applic...
Roger Karrer, Ashutosh Sabharwal, Edward W. Knight...
CASES
2005
ACM
13 years 9 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
NOSSDAV
2005
Springer
14 years 29 days ago
ACE: an active, client-directed method for reducing energy during web browsing
In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transit...
Haijin Yan, David K. Lowenthal, Kang Li