Sciweavers

1795 search results - page 98 / 359
» Security Models and Information Flow
Sort
View
116
Voted
SOCIALCOM
2010
15 years 1 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
155
Voted
GECCO
2007
Springer
196views Optimization» more  GECCO 2007»
15 years 9 months ago
An estimation of distribution algorithm with guided mutation for a complex flow shop scheduling problem
An Estimation of Distribution Algorithm (EDA) is proposed to approach the Hybrid Flow Shop with Sequence Dependent Setup Times and Uniform Machines in parallel (HFSSDST-UM) proble...
Abdellah Salhi, José Antonio Vázquez...
162
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
118
Voted
SIAMAM
2008
91views more  SIAMAM 2008»
15 years 3 months ago
A Fluid Dynamic Model for Telecommunication Networks with Sources and Destinations
This paper proposes a macroscopic fluid dynamic model dealing with the flows of information on a telecommunication network with sources and destinations. The model consists of a co...
Ciro D'Apice, Rosanna Manzo, Benedetto Piccoli
128
Voted
SIGMETRICS
2008
ACM
15 years 3 months ago
Long range mutual information
Network traffic modeling generally views traffic as a superposition of flows that creates a timeseries of volume counts (e.g. of bytes or packets). What is omitted from this view ...
Nahur Fonseca, Mark Crovella, Kavé Salamati...