Sciweavers

161 search results - page 10 / 33
» Towards a Theory of Anonymous Networking
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Kai Rannenberg, Giovanni Iachello
NN
2000
Springer
152views Neural Networks» more  NN 2000»
13 years 7 months ago
A neural network theory of proportional analogy-making
A neural network model that can simulate the learning of some simple proportional analogies is presented. These analogies include, for example, (a) red-square:red-circle yellow-sq...
Nilendu G. Jani, Daniel S. Levine
CORR
2004
Springer
119views Education» more  CORR 2004»
13 years 7 months ago
Exploring networks with traceroute-like probes: theory and simulations
Mapping the Internet generally consists in sampling the network from a limited set of sources by using traceroute-like probes. This methodology, akin to the merging of different s...
Luca Dall'Asta, J. Ignacio Alvarez-Hamelin, Alain ...
PERCOM
2010
ACM
13 years 5 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
MICAI
2007
Springer
14 years 1 months ago
Learning Performance in Evolutionary Behavior Based Mobile Robot Navigation
Abstract. In this paper we utilize information theory to study the impact in learning performance of various motivation and environmental configurations. This study is done within...
Tomás Arredondo Vidal, Wolfgang Freund, C&e...