Back to Results
First PageMeta Content
Network performance / Network coding / Wireless sensor network / Peer-to-peer / Computing / ANts P2P / Software / Information / Chord / Coding theory / Finite fields / Information theory


On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui
Add to Reading List

Document Date: 2011-12-10 04:32:26


Open Document

File Size: 125,80 KB

Share Result on Facebook

City

New York / Oakland / /

Company

B. Online Social Networks / Multicast Networks / Wireless Mesh Networks Wireless / Twitter / Computer Communciation Networks / Facebook / Pj / Interactive Networks / NetworkCoding Enabled Wireless Mesh Networks / P2P Streaming Systems / IEEE Press / P2P Live Streaming Systems / Wireless Mesh Networks / P2P File Sharing Systems / Streaming Systems / A. P2P Streaming Systems / /

Country

United States / Israel / /

Currency

pence / USD / /

/

Facility

Institute of Network Coding / The Chinese University of Hong Kong Email / /

IndustryTerm

wireless channels / Wireless Opportunistic Routing / Internet Power Law Topology Generators / decisions on purchasing which product / virtual networks / easy Internet access / realistic applications / backbone networks / wireless networks / power law degree distribution / brief background on network / substitutable products / recommendations on this product / backbone network / Wireless Environments / network services / star network / low quality product / opportunistic routing protocol / indispensable tool / distributed detection algorithm / social networks / detection algorithm / mesh routers / social network / detection algorithms / mesh networks / /

Organization

Chinese University of Hong Kong Email / John C.S. Lui Department of Computer Science & Engineering / RP (Pj ) / Institute of Network Coding / RN (Pj ) / /

Person

John C.S. Lui / D. M. Chiu / /

Position

Prime Minister / General / /

Product

Alg / 20th Int / /

ProvinceOrState

New York / California / /

Technology

present three algorithms / opportunistic routing protocol / peer-to-peer / distributed detection algorithm / B. Detection Algorithm / P2P / detection algorithms / viral marketing / network protocol / Randomized Detection Algorithm / predefined protocols / Mobile Computing / simulation / detection algorithm / mesh routers / /

SocialTag