Results 21 to 30 of about 9,433,709 (373)

Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation [PDF]

open access: yes, 2018
Motivated by growing concerns over ensuring privacy on social networks, we develop new algorithms and impossibility results for fitting complex statistical models to network data subject to rigorous privacy guarantees.
Borgs, Christian   +3 more
core   +1 more source

The WTFast’s Gamers Private Network (GPN ®) Performance Evaluation Results

open access: yesIEEE Systems Conference, 2020
The WTFast Gamers Private Network (GPN ®) is a client/server solution designed to improve network conditions with online games that utilize centralized game servers.
Gaétan Hains   +5 more
semanticscholar   +1 more source

5G industry wireless private network technology and business requirement model

open access: yesDianxin kexue, 2021
5G industry wireless private network has become one of the most important services for operators enabling the vertical industry.The gradual maturity of virtualization, multi-access edge computing, network slicing and other technologies have provided a ...
Xuezhi ZHANG, Jingbo ZHAO, Huijie ZHAO
doaj   +2 more sources

Comparison and analysis of private network solution based on TD-SCDMA and rent network solutio

open access: yesGong-kuang zidonghua, 2014
For development demands and characteristics of informatization of coal industry, the paper analyzed and compared private network solution and rent network solution mainly from adaptability, disaster tolerance, scheduling functions, security, voice ...
WANG Anyi, LUO Xiaofeng
doaj   +1 more source

Continuous Land Cover Change Detection in a Critically Endangered Shrubland Ecosystem Using Neural Networks

open access: yesRemote Sensing, 2022
Existing efforts to continuously monitor land cover change using satellite image time series have mostly focused on forested ecosystems in the tropics and the Northern Hemisphere.
Glenn R. Moncrieff
doaj   +1 more source

Detection of Virtual Private Network Traffic Using Machine Learning

open access: yesInt. J. Wirel. Networks Broadband Technol., 2020
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs).
Shane Miller, K. Curran, T. Lunney
semanticscholar   +1 more source

Learning from Neighbors about a Changing State [PDF]

open access: yes, 2020
Agents learn about a changing state using private signals and past actions of neighbors in a network. We characterize equilibrium learning and social influence in this setting.
Dasaratha, Krishna   +2 more
core   +1 more source

SplitBox: Toward Efficient Private Network Function Virtualization [PDF]

open access: yesHotMiddlebox@SIGCOMM, 2016
This paper presents SplitBox, an efficient system for privacy-preserving processing of network functions that are outsourced as software processes to the cloud.
H. Asghar   +5 more
semanticscholar   +1 more source

NLP Powered Intent Based Network Management for Private 5G Networks

open access: yesIEEE Access, 2023
Intent driven networking holds the promise of simplifying network operations by allowing operators to use declarative, instead of imperative, interfaces.
Joseph McNamara   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy