• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 29,866
Next 10 →

Protocolling the TINATEL-System: A Contribution for Long Term Evaluation of an AAC-System for Speech Impaired Persons to Access the Public Telephone Network

by Paul Panek
"... Abstract. This paper describes the long-term evaluation of the TINATEL-System, an Alternative and Augmentative Communication (AAC) device to be used for aided communication within the public telephone network. The system was especially developed for a single speech impaired User. An integrated logbo ..."
Abstract - Add to MetaCart
Abstract. This paper describes the long-term evaluation of the TINATEL-System, an Alternative and Augmentative Communication (AAC) device to be used for aided communication within the public telephone network. The system was especially developed for a single speech impaired User. An integrated

On the Security of Public Key Protocols

by Danny Dolev, Andrew C. Yao , 1983
"... Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an impr ..."
Abstract - Cited by 1383 (0 self) - Add to MetaCart
Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however

Systems Competition and Network Effects

by Michael L. Katz, Carl Shapiro - JOURNAL OF ECONOMIC PERSPECTIVES—VOLUME 8, NUMBER 2—SPRING 1994—PAGES 93–115 , 1994
"... Many products have little or no value in isolation, but generate value when combined with others. Examples include: nuts and bolts, which together provide fastening services; home audio or video components and programming, which together provide entertainment services; automobiles, repair parts and ..."
Abstract - Cited by 544 (6 self) - Add to MetaCart
on the behavior and performance of the variety of private and public institutions that arise in systems markets to influence expectations, facilitate coordination, and achieve compatibility. In many cases, the components purchased for a single system are spread over time, which means that rational buyers must

Measurement and Analysis of Online Social Networks

by Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee - In Proceedings of the 5th ACM/USENIX Internet Measurement Conference (IMC’07 , 2007
"... Online social networking sites like Orkut, YouTube, and Flickr are among the most popular sites on the Internet. Users of these sites form a social network, which provides a powerful means of sharing, organizing, and finding content and contacts. The popularity of these sites provides an opportunity ..."
Abstract - Cited by 698 (14 self) - Add to MetaCart
of multiple online social networks. We examine data gathered from four popular online social networks: Flickr, YouTube, LiveJournal, and Orkut. We crawled the publicly accessible user links on each site, obtaining a large portion of each social network’s graph. Our data set contains over 11.3 million users

Secure Routing for Mobile Ad Hoc Networks

by Panagiotis Papadimitratos, Zygmunt Haas - MOBILE COMPUTING AND COMMUNICATIONS REVIEW , 2002
"... For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of secu- rity cannot be underrated. The provision of comprehen- sive secure communication mandates that both route dis- covery and dat ..."
Abstract - Cited by 599 (14 self) - Add to MetaCart
For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of secu- rity cannot be underrated. The provision of comprehen- sive secure communication mandates that both route dis- covery

Establishing Pairwise Keys in Distributed Sensor Networks

by Donggang Liu, Peng Ning , 2003
"... Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as ..."
Abstract - Cited by 543 (29 self) - Add to MetaCart
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques

Bro: A System for Detecting Network Intruders in Real-Time

by Vern Paxson , 1999
"... We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give an overview of the system's design, which emphasizes highspeed (FDDI-rate) monitoring, real-time notification, clear ..."
Abstract - Cited by 925 (42 self) - Add to MetaCart
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give an overview of the system's design, which emphasizes highspeed (FDDI-rate) monitoring, real-time notification

Group formation in large social networks: membership, growth, and evolution

by Lars Backstrom, Dan Huttenlocher, Jon Kleinberg, Xiangyang Lan - IN KDD ’06: PROCEEDINGS OF THE 12TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING , 2006
"... The processes by which communities come together, attract new members, and develop over time is a central research issue in the social sciences — political movements, professional organizations, and religious denominations all provide fundamental examples of such communities. In the digital domain, ..."
Abstract - Cited by 496 (19 self) - Add to MetaCart
, on-line groups are becoming increasingly prominent due to the growth of community and social networking sites such as MySpace and LiveJournal. However, the challenge of collecting and analyzing large-scale timeresolved data on social groups and communities has left most basic questions about

Modeling Internet Topology

by Kenneth Calvert, Matthew B. Doar, Ellen W. Zegura - IEEE COMMUNICATIONS MAGAZINE , 1997
"... The topology of a network, or a group of networks such as the Internet, has a strong bearing on many management and performance issues. Good models of the topological structure of a network are essential for developing and analyzing internetworking technology. This article discusses how graph-based ..."
Abstract - Cited by 493 (21 self) - Add to MetaCart
-based models can be used to represent the topology of large networks, particularly aspects of locality and hierarchy present in the Internet. Two implementations that generate networks whose topology resembles that of typical internetworks are described, together with publicly available source code.

Freenet: A Distributed Anonymous Information Storage and Retrieval System

by Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong - INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY , 2001
"... We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data ..."
Abstract - Cited by 1064 (12 self) - Add to MetaCart
We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store
Next 10 →
Results 1 - 10 of 29,866
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University