• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,581
Next 10 →

BRITE: An approach to universal topology generation,”

by Alberto Medina , Anukool Lakhina , Ibrahim Matta , John Byers - in Proceedings of the IEEE Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, , 2001
"... Abstract Effective engineering of the Internet is predicated upon a detailed understanding of issues such as the large-scale structure of its underlying physical topology, the manner in which it evolves over time, and the way in which its constituent components contribute to its overall function. U ..."
Abstract - Cited by 448 (12 self) - Add to MetaCart
, and interoperability. Representativeness leads to synthetic topologies that accurately reflect many aspects of the actual Internet topology (e.g. hierarchical structure, node degree distribution, etc.). Inclusiveness combines the strengths of as many generation models as possible in a single generation tool

Torus actions and their applications in topology and combinatorics

by Victor M. Buchstaber , Taras E. Panov
"... asabridgeconnectingcombinatorialandconvexgeometrywithcommutativeand 13F55,52C35. combinatorialobjectcanberecoveredbyrealizingitastheorbitstructurefora propermanifoldorcomplexactedonbyatorus.Thelattercanbeasymplectic combinatoricsofthespaceoforbits.Conversely,themostsubtlepropertiesofa standingthegeo ..."
Abstract - Cited by 121 (4 self) - Add to MetaCart
,polytopes,andarrangements.Thisapproachalsoprovides fromcommutativeandhomologicalalgebrausedincombinatorics. arrangementcomplement,etc.,whilethecombinatorialobjectsincludesimplicial

De-anonymizing social networks

by Arvind Narayanan, Vitaly Shmatikov , 2009
"... Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc. We present ..."
Abstract - Cited by 216 (6 self) - Add to MetaCart
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc. We present

Brite: Universal topology generation from a user’s perspective

by Alberto Medina, Anukool Lakhina, Ibrahim Matta, John Byers , 2001
"... Effective engineering of the Internet is predicated upon a detailed understanding of issues such as the large-scale structure of its underlying physical topology, the manner in which it evolves over time, and the way in which its constituent components contribute to its overall function. Unfortunate ..."
Abstract - Cited by 137 (1 self) - Add to MetaCart
, and interoperability. Representativeness leads to synthetic topologies that accurately reflect many aspects of the actual Internet topology (e.g. hierarchical structure, degree distribution, etc.). Inclusiveness combines the strengths of as many generation models as possible in a single generation tool

Some properties of soft topologies and group soft topologies

by Sk Nazmul , S K Samanta
"... Abstract. This paper aims to study some properties of soft neighbourhood system of identity soft element of group soft topology. Also some results on soft topologies and enriched soft topologies are established using soft elements. For this we define finite soft set, pseudo constant soft set, cofin ..."
Abstract - Add to MetaCart
, cofinite soft topology etc. and study their properties. 2010 AMS Classification: 54A40, 06D72, 03E72, 20N25

Analysis of the autonomous system network topology

by Damien Magoni, Bld Sébastien Brant, Jean Jacques Pansiot, Bld Sébastien Brant - c) 2002 IEEE. 1355 IEEE INFOCOM 2002 , 2001
"... Mapping the Internet is a major challenge for network researchers. It is the key to building a successful modeling tool able to generate realistic graphs for use in networking simulations. In this paper we provide a detailed analysis of the inter-domain topology of the Internet. The collected data a ..."
Abstract - Cited by 81 (15 self) - Add to MetaCart
and the resulting analysis began in November 1997 and cover a period of two and a half years. We give results concerning major topology properties (nodes and edges number, average degree and distance, routing policy, etc.) and main distributions (degree, distance, etc.). We also present many results about the trees

Firmato: A Novel Firewall Management Toolkit

by Yair Bartal, Alain Mayer, KOBBI NISSIM, AVISHAI WOOL , 2004
"... In recent years packet-filtering firewalls have seen some impressive technological advances (e.g., stateful inspection, transparency, performance, etc.) and wide-spread deployment. In contrast, firewall and security management technology is lacking. In this paper we present Firmato, afirewall manage ..."
Abstract - Cited by 174 (3 self) - Add to MetaCart
In recent years packet-filtering firewalls have seen some impressive technological advances (e.g., stateful inspection, transparency, performance, etc.) and wide-spread deployment. In contrast, firewall and security management technology is lacking. In this paper we present Firmato, afirewall

The Geometry and Topology of Toric Hyperkähler Manifolds

by Roger Bielawski, Andrew S. Dancer
"... . We study hyperkahler manifolds that can be obtained as hyperkahler quotients of flat quaternionic space by tori, and in particular, their relation to toric varieties and Delzant polytopes. When smooth, these hyperkahler quotients are complete. We also show that for smooth projective toric varie ..."
Abstract - Cited by 75 (5 self) - Add to MetaCart
metric and its Kahler potential. 1. Introduction A 4n-dimensional manifold is hyperkahler if it possesses a Riemannian metric g which is Kahler with respect to three complex structures J 1 ; J 2 ; J 3 satisfying the quaternionic relations J 1 J 2 = \GammaJ 2 J 1 = J 3 etc. To date the most powerful

A graph-based system for network-vulnerability analysis

by Cynthia Phillips - in Proceedings of the 1998 workshop on New security paradigms , 1998
"... caphill @ sandia..qov This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences follow ..."
Abstract - Cited by 168 (0 self) - Add to MetaCart
detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is "matched " with the network configuration information

A Review of Deformable Surfaces: Topology, Geometry and Deformation

by J. Montagnat, H. Delingette, N. Ayache - Image and Vision Computing , 2001
"... Deformable models have raised much interest and found various applications in the fields of computer vision and medical imaging. They provide an extensible framework to reconstruct shapes. Deformable surfaces, in particular, are used to represent 3D objects. They have been used for pattern recogniti ..."
Abstract - Cited by 70 (10 self) - Add to MetaCart
recognition [35,2], computer animation [100], geometric modelling [59], simulation [28], boundary tracking [11], image segmentation [69,67,91,5,45], etc. In this paper we propose a survey on deformable surfaces. Many surface representation have been proposed to meet different 3D reconstruction problem
Next 10 →
Results 1 - 10 of 1,581
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University