Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Kai-Hau Yeung"'
Publikováno v:
Journal of Communications Software and Systems, Vol 3, Iss 4, Pp 256-265 (2007)
A cache replacement algorithm called probability based replacement (PBR) is proposed in this paper. The algorithm makes replacement decision based on the byte accessprobabilities of documents. This concept can be applied to both small conventional we
Externí odkaz:
https://doaj.org/article/ac8033a730f94ce6a9b73b6492433b40
Publikováno v:
SECURITY AND PRIVACY.
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030228675
Network infrastructure devices form the backbone of a network. Any computer connecting to the network can communicate with these devices by running an appropriate software. Because of this, hackers could easily attack the network infrastructure. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78718a327012dd9935ae8eb71c16fc74
https://doi.org/10.1007/978-3-030-22868-2_35
https://doi.org/10.1007/978-3-030-22868-2_35
Although Vehicle Ad Hoc Network (VANETs) as a new technology is being used in wide range of applications to improve the driving experience as well as safety, it is vulnerable to various type of network attacks. Literature studies have revealed severa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::68c8fa7d81accde265abb0cec07c85a0
https://hdl.handle.net/10356/143596
https://hdl.handle.net/10356/143596
Publikováno v:
DSC
IoT networks are designed to connect as many devices as possible. Since any device can be connected to an IoT network, it faces an authentication issue, which may be exploited by attackers to break into the IoT network. A solution discussed in this p
Autor:
Wei Fan, Kai-Hau Yeung
Publikováno v:
Communications in Nonlinear Science and Numerical Simulation. 20:1015-1025
As social networking services are popular, many people may register in more than one online social network. In this paper we study a set of users who have accounts of three online social networks: namely Foursquare, Facebook and Twitter. Community st
Publikováno v:
Wireless Networks. 21:2357-2368
Cognitive radio ad hoc networks (CRAHNs) were developed to improve the utilization ratio of licensed spectrum. Since spectrum opportunities for users are varied over time and location, enhancing the spectrum effectiveness is a goal and also a challen
Publikováno v:
Communications in Nonlinear Science and Numerical Simulation. 20:250-262
This paper proposes several comparable degree-energy-based local random routing strategies for wireless sensor networks and reports a detailed numerical study of the new strategies. Specifically, energy consumption and lifetime efficiency of sensor n
Publikováno v:
IT Professional. 16:28-33
Online social networks have been typically created for convenience--so they haven't been built from the ground up with security in mind. They often have confusing privacy settings and are susceptible to various kinds of attacks that exploit users' tr
Autor:
Kai-Hau Yeung, Wei Fan
Publikováno v:
Physica A: Statistical Mechanics and its Applications. 405:226-234
Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks.