Sciweavers

1737 search results - page 279 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CMOT
2004
83views more  CMOT 2004»
15 years 2 months ago
Networks, Fields and Organizations: Micro-Dynamics, Scale and Cohesive Embeddings
Social action is situated in fields that are simultaneously composed of interpersonal ties and relations among organizations, which are both usefully characterized as social netwo...
Douglas R. White, Jason Owen-Smith, James Moody, W...
WCNC
2010
IEEE
15 years 8 days ago
Physical Layer Network Coding with Multiple Antennas
: The two-phase MIMO NC (network coding) scheme can be used to boost the throughput in a two-way relay channel in which nodes are equipped with multiple antennas. The obvious strat...
Shengli Zhang, Soung Chang Liew
INFOCOM
2003
IEEE
15 years 7 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
91
Voted
WWW
2007
ACM
16 years 3 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
SOCIALCOM
2010
15 years 9 days ago
Traffic in Social Media I: Paths Through Information Networks
Wikipedia is used every day by people all around the world, to satisfy a variety of information needs. We crosscorrelate multiple Wikipedia traffic data sets to infer various behav...
Jacob Ratkiewicz, Alessandro Flammini, Filippo Men...