Sciweavers

418 search results - page 35 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
CONEXT
2009
ACM
13 years 9 months ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
CIKM
2008
Springer
13 years 10 months ago
Topological analysis of an online social network for older adults
Social network systems on the Internet, such MySpace and LinkedIn, are growing in popularity around the world. The level of such activity is now comparable to that associated with...
Marcella Wilson, Charles K. Nicholas
BMCBI
2010
135views more  BMCBI 2010»
13 years 8 months ago
Lists2Networks: Integrated analysis of gene/protein lists
Background: Systems biologists are faced with the difficultly of analyzing results from large-scale studies that profile the activity of many genes, RNAs and proteins, applied in ...
Alexander Lachmann, Avi Ma'ayan
OOPSLA
2009
Springer
14 years 2 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich