Sciweavers

1737 search results - page 42 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 5 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
CIKM
2007
Springer
14 years 2 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 2 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
VTC
2008
IEEE
179views Communications» more  VTC 2008»
14 years 2 months ago
Relay Subset Selection in Wireless Networks Using Partial Decode-and-Forward Transmission
This paper considers the problem of selecting a subset of nodes in a two-hop wireless network to act as relays in aiding the communication between the source-destination pair. Opt...
Caleb K. Lo, Sriram Vishwanath, Robert W. Heath Jr...
ESANN
2006
13 years 9 months ago
On the selection of hidden neurons with heuristic search strategies for approximation
Abstract. Feature Selection techniques usually follow some search strategy to select a suitable subset from a set of features. Most neural network growing algorithms perform a sear...
Ignacio Barrio, Enrique Romero, Lluís A. Be...