Index Terms
- Snowden weak link: copying to USB device
Recommendations
Weak k-anonymity: a low-distortion model for protecting privacy
ISC'06: Proceedings of the 9th international conference on Information SecuritySharing microdata tables is a primary concern in today information society. Privacy issues can be an obstacle to the free flow of such information. In recent years, disclosure control techniques have been developed to modify microdata tables in order to ...
Weak link prediction based on hyper latent distance in complex network
AbstractWeak links play a crucial role in the functionality and dynamics of networks. Nevertheless, the ability to forecast weak links accurately remains elusive. This article introduces a neural network framework that solely utilizes the network ...
Highlights- We explain why the traditional methods fail in predicting weak links.
- We propose a topology-based method that aims to predict weak links.
- We conduct abundant experiments to validate the effectiveness of our method.
Performance analysis of OTDM link at 40 Gbps
ICGCIOT '15: Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT)In the communication world, higher speed reliable data transmission is always required. For the higher bit rate and flexible bandwidth Optical Time Division Multiplexing (OTDM) network is one of the best network. The performance of OTDM is depends upon ...
Comments