Sciweavers

1300 search results - page 185 / 260
» Toward network data independence
Sort
View
ICCS
2007
Springer
15 years 10 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
WCNC
2010
IEEE
15 years 8 months ago
Radio Resource Management in OFDMA-Based Cellular Networks Enhanced with Fixed and Nomadic Relays
—The provision of very high data rates in a ubiquitous manner throughout the service area is a great challenge for 4G and beyond-4G wireless networks. Towards that end, the deplo...
Mohamed Salem, Abdulkareem Adinoyi, Halim Yanikome...
TWC
2008
154views more  TWC 2008»
15 years 4 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
ICAPR
2005
Springer
15 years 10 months ago
GP Ensemble for Distributed Intrusion Detection Systems
In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multiisland model-based environment to monitor security...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
SEMWEB
2001
Springer
15 years 9 months ago
An RDF Framework for Resource Discovery
Resource discovery is a problem common to almost all distributed systems. Instead of resulting in a one or a small number of discovery mechanisms, completely different and incompa...
Franklin Reynolds