Sciweavers

1737 search results - page 103 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
NAACL
2003
15 years 3 months ago
Automatic Extraction of Semantic Networks from Text using Leximancer
Leximancer is a software system for performing conceptual analysis of text data in a largely language independent manner. The system is modelled on Content Analysis and provides u...
Andrew E. Smith
132
Voted
ISI
2008
Springer
15 years 1 months ago
A locality model of the evolution of blog networks
We present a model of evolution of large social networks. Our model is based on the local nature of communication: a node's communication energy is spend mostly within it'...
Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kel...
GLOBECOM
2006
IEEE
15 years 8 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
15 years 8 months ago
Delta Hedging Energy Portfolios: an Exploratory Study
1 Delta hedging, although widely used in commodity markets, needs to be further adapted to electricity markets. Given the extreme volatility of electricity prices, even a portfolio...
Richard Goldberg, James Read, Art Altman, Remi Aud...
110
Voted
MOBIHOC
2008
ACM
16 years 2 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao