Sciweavers

CISSE
2008
Springer
13 years 9 months ago
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks
Mishkovski Igor, Sonja Filiposka, Sasho Gramatikov...
CISSE
2008
Springer
13 years 9 months ago
Network Topology Impact on Influence Spreading
-- Networks composed of large number of nodes interacting in structured ways such as power grids, communication networks, social networks or market networks are critical port of th...
Sasho Gramatikov, Dimitar Trajanov, Ljupco Kocarev...
CISSE
2008
Springer
13 years 9 months ago
Modeling Trust in Wireless Ad-Hoc Networks
Tirthankar Ghosh, Hui Xu
CISSE
2008
Springer
13 years 9 months ago
Ontology-Based Web Application Testing
Testing Web applications is still a challenging work which can greatly benefit from test automation techniques. In this paper, we focus on using ontologies as a means of test autom...
Samad Paydar, Mohsen Kahani
CISSE
2008
Springer
13 years 9 months ago
A New Methodology for Self Localization in Wireless Sensor Networks
Localization is the subject matter that has allured the attention of many researchers in the field of wireless sensor network. It is the process of assigning or computing the locat...
Allon Rai, Sangita Ale, Syed Sajjad Rizvi, Aasia R...
CISSE
2008
Springer
13 years 9 months ago
From Constraints to Resolution Rules Part I : conceptual framework
: Many real world problems appear naturally as constraints satisfaction problems (CSP), for which very efficient algorithms are known. Most of these involve the combination of two ...
Denis Berthier
CISSE
2008
Springer
13 years 9 months ago
Features Based Approach to Identify the P2P File Sharing
With the improvement of computer network and the growth of bandwidth, the types of Internet traffic have been changed. The P2P file sharing application became the significant sour...
Jian-Bo Chen