Network analysis

Results: 5019



#Item
661

Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis – Public Review Sujata Banerjee HP Labs Palo Alto, CA, USA

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:42:26
    662E-commerce / Cryptocurrencies / Alternative currencies / Chamber of Digital Commerce / Foreign exchange market / Digital currency / Financial Crimes Enforcement Network / Office of Intelligence and Analysis / Currency

    FOR IMMEDIATE RELEASE December 2, 2014 CONTACT: Dana Marston

    Add to Reading List

    Source URL: www.digitalchamber.org

    Language: English
    663

    A Network Analysis of Countries’ Export Flows: Firm Grounds for the Building Blocks of the Economy Guido Caldarelli1,2,3, Matthieu Cristelli2,4*, Andrea Gabrielli2,3, Luciano Pietronero2,4,3, Antonio Scala2,3, Andrea T

    Add to Reading List

    Source URL: lims.ac.uk

    Language: English - Date: 2013-11-19 10:36:32
      664

      SONAS: Social Network Analysis and Simulation Systems Summary: The objective of this project is to build a social network analysis and simulation system through extensively study different social networks. The research

      Add to Reading List

      Source URL: ilabsite.org

      - Date: 2013-04-17 14:19:40
        665

        Using Social Network Analysis to Highlight an Emerging Online Community of Practice Anthony Cocciolo, Hui Soo Chae, Gary Natriello, Teachers College, Columbia University 525 West 120th Street., New York, NYUSA

        Add to Reading List

        Source URL: www.thinkingprojects.org

        Language: English - Date: 2011-06-28 13:17:53
          666Graph theory / Mathematics / Network theory / Networks / Algebraic graph theory / Network analysis / Clustering coefficient / Graph / Complex network / Topology / Connectivity / Trapezoid graph

          A Scalable Approach to Size-Independent Network Similarity Michele Berlingerio∗ Danai Koutra† Tina Eliassi-Rad‡

          Add to Reading List

          Source URL: snap.stanford.edu

          Language: English - Date: 2012-11-13 14:31:43
          667Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

          SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

          Add to Reading List

          Source URL: www.di.fc.ul.pt

          Language: English - Date: 2013-01-18 09:24:08
          668

          BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu1,2, Roberto Perdisci3, Junjie Zhang1, and Wenke Lee1

          Add to Reading List

          Source URL: faculty.cs.tamu.edu

          Language: English - Date: 2008-08-04 21:45:35
            669Trey Ideker / Software / Systems biology / Systems science / Cytoscape / University of California /  San Diego / Sanford Burnham Prebys Medical Discovery Institute / Biology

            Many Thanks to Our Sponsors SAN DIEGO CENTER FOR SYSTEMS BIOLOGY Cytoscape Functionality and Network Analysis

            Add to Reading List

            Source URL: sdcsb.ucsd.edu

            Language: English - Date: 2014-01-30 01:07:52
            670Stochastic processes / Probability theory / Queueing theory / Probability / Mathematical analysis / Network performance / Markov models / Markov processes / Jackson network / M/M/c queue / Product-form solution / M/M/1 queue

            Describing network congestion with an analytic queueing network model. Carolina Osorio, EPFL Michel Bierlaire, EPFL Conference paper STRC 2007

            Add to Reading List

            Source URL: www.strc.ch

            Language: English - Date: 2008-11-24 07:42:20
            UPDATE