Academic literature on the topic 'Tag Network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tag Network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Tag Network"
Hu, Jinyu, Zhiwei Gao, and Weisen Pan. "Multiangle Social Network Recommendation Algorithms and Similarity Network Evaluation." Journal of Applied Mathematics 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/248084.
Full textShimizu, Hiroshi. "Ring Network with VLAN Tag." IEEJ Transactions on Electronics, Information and Systems 125, no. 10 (2005): 1602–7. http://dx.doi.org/10.1541/ieejeiss.125.1602.
Full textYu, Xiaolei, Yujun Zhou, Zhenlu Liu, and Zhimin Zhao. "An optimal measurement method for spatial distribution of radio frequency identification multi-tag based on image analysis and PSO." Transactions of the Institute of Measurement and Control 41, no. 12 (February 6, 2019): 3331–39. http://dx.doi.org/10.1177/0142331218823864.
Full textTürker, İlker, and Eyüb Ekmel Sulak. "A multilayer network analysis of hashtags in twitter via co-occurrence and semantic links." International Journal of Modern Physics B 32, no. 04 (February 2018): 1850029. http://dx.doi.org/10.1142/s0217979218500297.
Full textPing, Deng Li, Guo Bing, and Zheng Wen. "Web Service Clustering Approach Based on Network and Fused Document-Based and Tag-Based Topics Similarity." International Journal of Web Services Research 18, no. 3 (July 2021): 63–81. http://dx.doi.org/10.4018/ijwsr.2021070104.
Full textRyoo, Jihoon, Jinghui Jian, Akshay Athalye, Samir R. Das, and Milutin Stanacevic. "Design and Evaluation of “BTTN”: A Backscattering Tag-to-Tag Network." IEEE Internet of Things Journal 5, no. 4 (August 2018): 2844–55. http://dx.doi.org/10.1109/jiot.2018.2840144.
Full textShimizu, Hiroshi. "A ring network with VLAN tag." Electrical Engineering in Japan 166, no. 1 (January 15, 2009): 60–66. http://dx.doi.org/10.1002/eej.20422.
Full textLAN, JAMES K., WELL Y. CHOU, and CHIUYUAN CHEN. "EFFICIENT ROUTING ALGORITHMS FOR GENERALIZED SHUFFLE-EXCHANGE NETWORKS." Discrete Mathematics, Algorithms and Applications 01, no. 02 (June 2009): 267–81. http://dx.doi.org/10.1142/s179383090900021x.
Full textLee, Hyuek-Jae, Soo-Young Lee, Sang-Yung Shin, and Bo-Yun Koh. "TAG: A Neural Network Model for Large-Scale Optical Implementation." Neural Computation 3, no. 1 (February 1991): 135–43. http://dx.doi.org/10.1162/neco.1991.3.1.135.
Full textRYU, WOOSEOK, JOONHO KWON, and BONGHEE HONG. "A SIMULATION NETWORK MODEL TO EVALUATE RFID MIDDLEWARES." International Journal of Software Engineering and Knowledge Engineering 21, no. 06 (September 2011): 779–801. http://dx.doi.org/10.1142/s0218194011005517.
Full textDissertations / Theses on the topic "Tag Network"
Ye, Qianyun. "2.4-GHz Wireless Network Based Multi-Tag Access System." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188491.
Full textWei, Wei. "Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach." Diss., The University of Arizona, 2010. http://hdl.handle.net/10150/195123.
Full textHijazi, Issa, and Pontus Pettersson. "Animal ID Tag Recognition with Convolutional and Recurrent Neural Network : Identifying digits from a number sequence with RCNN." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17031.
Full textEsfahani, Alireza. "Security schemes against pollution attacks in network coding over wireless networks." Doctoral thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/21773.
Full textResumo em português não disponivel
The topic of this thesis is how to achieve e cient security against pollution attacks by exploiting the structure of network coding. There has recently been growing interest in using network coding techniques to increase the robustness and throughput of data networks, and reduce the delay in wireless networks, where a network coding-based scheme takes advantage of the additive nature of wireless signals by allowing two nodes to transmit simultaneously to the relay node. However, Network Coding (NC)-enabled wireless networks are susceptible to a severe security threat, known as data pollution attack, where a malicious node injects into the network polluted (i.e., corrupted) packets that prevent the destination nodes from decoding correctly. Due to recoding at the intermediate nodes, according to the core principle of NC, the polluted packets propagate quickly into other packets and corrupt bunches of legitimate packets leading to network resource waste. Hence, a lot of research e ort has been devoted to schemes against data pollution attacks. Homomorphic Message Authentication Code (MAC)-based schemes are a promising solution against data pollution attacks. However, most of them are susceptible to a new type of pollution attack, called tag pollution attack, where an adversary node randomly modi es tags appended to the end of the transmitted packets. Therefore, in this thesis, we rst propose a homomorphic message authentication code-based scheme, providing resistance against data pollution attacks and tag pollution attacks in XOR NC-enabled wireless networks. Moreover, we propose four homomorphic message authentication code-based schemes which provide resistance against data and tag pollution attacks in Random Linear Network Coding (RLNC). Our results show that our proposed schemes are more e cient compared to other competitive tag pollution immune schemes in terms of complexity, communication overhead and key storage overhead.
Jeevarathnam, Nanda Gopal. "Grid-Based RFID Indoor Localization Using Tag Read Count and Received Signal Strength Measurements." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/7039.
Full textKlaus, Jan Philipp. "Three Essays on the Effects of Executives' Informal Networks on Shareholder Value, Financial and Tax Reporting Outcomes." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1707258/.
Full textCranley, Nikki. "The Implications for Network Switch Design in a Networked FTI Data Acquisition System." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595675.
Full textSwitches are a critical component in any networked FTI data acquisition system in order to allow the forwarding of data from the DAU to the target destination devices such as the network recorder, PCM gateways, or ground station. Commercial off the shelf switches cannot meet the harsh operating conditions of FTI. This paper describes a hardware implementation of a crossbar switching architecture that meets the reliability and performance requirements of FTI equipment. Moreover, by combining the crossbar architecture with filtering techniques, the switch can be configured to achieve sophisticated forwarding operations. By way of illustration, a Gigabit network tap application is used to demonstrate the fundamental concepts of switching, forwarding, crossbar architecture, and filtering.
Guo, Yue. "Capability assessment of VAr support and demand response to transmission network using flexible tap changing techniques in distribution networks." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/capability-assessment-of-var-support-and-demand-response-to-transmission-network-using-flexible-tap-changing-techniques-in-distribution-networks(5a373163-d2c9-4e13-9720-0c4fa0456c3f).html.
Full textBaloch, Fariha. "Tag anti-collision algorithms for active and passive RFID networks with foresight." Diss., Wichita State University, 2014. http://hdl.handle.net/10057/10931.
Full textThesis (Ph.D.)-- Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
Holmeide, Øeyvind, and Markus Schmitz. "Advanced Network Tap Application for Flight Test Instrumentation Systems." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596387.
Full textDigital data distribution systems are widely used in Aerospace and Defense products to allow devices to communicate with one another. In many cases it is desirable to monitor the data traffic flowing between two points in a copper or fiber based Operational or Onboard Network System (ONS) for Flight Test Instrumentation (FTI) purposes because these ONS systems may carry important data which can be used without duplicating/installing a specific FTI data acquisition system to receive this data. The two types of network taps that can be used are Inline Network Taps and network end-point taps. This paper examines the usage of Inline Network Taps for FTI applications and how they can support network access strategies and objectives. An Inline Network Tap is a hardware device which allows access to data flowing across a network. These devices are typically active/powered and have a number of ports: a first tap port, a second tap port, and one or more mirror ports. An in-line network tap inserted between the first and second tap port passes all data traffic through unimpeded but also copies that same data to one or more mirror ports. Some Inline Network Tap devices may also pass packets when the tap is not powered or a malfunction is detected on the device via an integrated by-pass function. If the Inline Network Tap device goes offline the unit automatically bypasses the tap connection and data traffic is directed through the bypass directly to network devices. This capability is crucial for inline usage on mission critical network segments that cannot afford the risk of losing the network connection. An in-line network tap can either be based on copper or fiber technology and as a "filterable" network tap can also provide advanced packet filtering capabilities. These filterable network taps can selectively pass data, e.g., based on VLAN ID or other parameters, to a mirror port for deep analysis, monitoring and recording. Another advanced tap function that is presented in this paper is the support for inserting time stamps at the tap level in monitored packets which provides a reference time when the data content of a given packet was generated at a data source. This capability is a significant feature for FTI applications as most ONS systems do not provide time stamped data.
Books on the topic "Tag Network"
Davie, Bruce S. Switching in IP networks: IP switching, tag switching, and related technologies. San Francisco, Calif: Morgan Kaufmann Publishers, 1998.
Find full textThe Tao of network security monitoring: Beyond intrusion detection. Boston: Addison-Wesley, 2005.
Find full textNetworking: How to creatively tap your people resources. Mission, Kan: SkillPath Publications, 1993.
Find full textLiebing, Edward. NetWare user's guide: Version 2.2 : tap the power of NetWare v2.2. Redwood City, Calif: M&T Books, 1991.
Find full textHŭi-gap, Chʻoe, ed. Dijitʻŏl kŭmnyung tae hyŏngmyŏng. Sŏul-si: Samsŏng Kyŏngje Yŏnʼguso, 2002.
Find full textBu ru 21 shi ji de nong ye xin xi hua: Xin xi zi yuan kai fa li lun tan tao. Beijing: Jing ji ke xue chu ban she, 2000.
Find full textShanghai shu zi jiao yu gong gong fu wu ping tai yan jiu. Shanghai Shi: Shanghai jiao tong da xue chu ban she, 2011.
Find full textHagemann, Stephan. A framework for the consistent usage of tag-based mashups. [Amsterdam]: Ios Press, 2010.
Find full textBook chapters on the topic "Tag Network"
Trattner, Christoph, Denis Helic, and Markus Strohmaier. "Tag Clouds." In Encyclopedia of Social Network Analysis and Mining, 2103–7. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-6170-8_126.
Full textTrattner, Christoph, Denis Helic, and Markus Strohmaier. "Tag Clouds." In Encyclopedia of Social Network Analysis and Mining, 3035–39. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_126.
Full textTrattner, Christoph, Denis Helic, and Markus Strohmaier. "Tag Clouds." In Encyclopedia of Social Network Analysis and Mining, 1–5. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4614-7163-9_126-1.
Full textArmknecht, Frederik, Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann. "On RFID Privacy with Mutual Authentication and Tag Corruption." In Applied Cryptography and Network Security, 493–510. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13708-2_29.
Full textKim, Jinhwan, Hyocheol Jeong, Myungjae Kim, Haosong Gou, Munseok Choi, and Younghwan Yoo. "Tag-to-Tag Mesh Network Using Dual-Radio RFID System for Port Logistics." In Dynamics in Logistics, 311–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-11996-5_28.
Full textMeisner, Eric, Wei Yang, and Volkan Isler. "Probabilistic Network Formation through Coverage and Freeze-Tag." In Springer Tracts in Advanced Robotics, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00312-7_1.
Full textArita, Seiko, and Koji Tsurudome. "Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions." In Applied Cryptography and Network Security, 186–200. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_12.
Full textBlackburn, Simon R., and M. J. B. Robshaw. "On the Security of the Algebraic Eraser Tag Authentication Protocol." In Applied Cryptography and Network Security, 3–17. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39555-5_1.
Full textMistry, Oly, and Sandip Sen. "Probabilistic Approaches to Tag Recommendation in a Social Bookmarking Network." In Principles and Practice of Multi-Agent Systems, 270–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25920-3_19.
Full textYan, Bin, Lichen Zhang, Longjiang Guo, Meirei Ren, and Ana Wang. "Personalized Recommendation Based on Tag Semantics in the Heterogeneous Information Network." In Communications in Computer and Information Science, 224–35. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-1785-3_17.
Full textConference papers on the topic "Tag Network"
Wang, Chaoyue, Chaohui Wang, Chang Xu, and Dacheng Tao. "Tag Disentangled Generative Adversarial Network for Object Image Re-rendering." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/404.
Full textChen, Bo, Wei Guo, Ruiming Tang, Xin Xin, Yue Ding, Xiuqiang He, and Dong Wang. "TGCN: Tag Graph Convolutional Network for Tag-Aware Recommendation." In CIKM '20: The 29th ACM International Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3340531.3411927.
Full textWengang Cheng and Xiaolei Wang. "Image tag refinement using tag semantic and visual similarity." In 2011 International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2011. http://dx.doi.org/10.1109/iccsnt.2011.6182401.
Full textBanerjee, Subhasis, and Kalapriya Kannan. "Tag-In-Tag: Efficient flow table management in SDN switches." In 2014 10th International Conference on Network and Service Management (CNSM). IEEE, 2014. http://dx.doi.org/10.1109/cnsm.2014.7014147.
Full textAhmad, Abeer, Yuanfei Huang, Xiao Sha, Akshay Athalye, Milutin Stanacevic, Samir R. Das, and Petar M. Djuric. "On Measuring Doppler Shifts between Tags in a Backscattering Tag-to-Tag Network with Applications in Tracking." In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2020. http://dx.doi.org/10.1109/icassp40776.2020.9053291.
Full textWang, Yun, Lun Du, Guojie Song, Xiaojun Ma, Lichen Jin, Wei Lin, and Fei Sun. "Tag2Gauss: Learning Tag Representations via Gaussian Distribution in Tagged Networks." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/527.
Full textDowling, Matthew, Monica F. Bugallo, Samir Das, and Petar M. Djuric. "Tracking of Objects in a Passive Backscattering Tag-to-Tag Network." In 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2018. http://dx.doi.org/10.1109/spawc.2018.8446002.
Full textLiu, Qi, Ruobing Xie, Lei Chen, Shukai Liu, Ke Tu, Peng Cui, Bo Zhang, and Leyu Lin. "Graph Neural Network for Tag Ranking in Tag-enhanced Video Recommendation." In CIKM '20: The 29th ACM International Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3340531.3416021.
Full textZhang, Yuan, Hongshen Chen, Yihong Zhao, Qun Liu, and Dawei Yin. "Learning Tag Dependencies for Sequence Tagging." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/637.
Full textQian, Qiao, Bo Tian, Minlie Huang, Yang Liu, Xuan Zhu, and Xiaoyan Zhu. "Learning Tag Embeddings and Tag-specific Composition Functions in Recursive Neural Network." In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). Stroudsburg, PA, USA: Association for Computational Linguistics, 2015. http://dx.doi.org/10.3115/v1/p15-1132.
Full textReports on the topic "Tag Network"
Alstadsæter, Annette, Wojciech Kopczuk, and Kjetil Telle. Social Networks and Tax Avoidance: Evidence from a Well-Defined Norwegian Tax Shelter. Cambridge, MA: National Bureau of Economic Research, October 2018. http://dx.doi.org/10.3386/w25191.
Full textMerrill, W. M., K. Sohrabi, G. J. Pottie, W. Kaiser, and H. L. Liu. Pico Wireless Integrated Network Sensors (PicoWINS): Investigating the Feasibility of Wireless Tactical Tags. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada404577.
Full textSouza, Pedro CL, Imran Rasul, and Áureo de Paula. Identifying network ties from panel data: theory and an application to tax competition. The IFS, October 2019. http://dx.doi.org/10.1920/wp.cem.2019.5519.
Full textBoning, William, John Guyton, Ronald Hodge, Joel Slemrod, and Ugo Troiano. Heard it Through the Grapevine: Direct and Network Effects of a Tax Enforcement Field Experiment. Cambridge, MA: National Bureau of Economic Research, February 2018. http://dx.doi.org/10.3386/w24305.
Full textChen, Dan, and Qiang Zhou. Induction of Apoptosis by Targeting the Microtubule Network: Using HIV Tat as a Model System. Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415803.
Full textChen, Dan, and Qiang Zhou. Induction of Apoptosis by Targeting the Microtubule Network: Using HIV Tat as a Model System. Fort Belvoir, VA: Defense Technical Information Center, April 2004. http://dx.doi.org/10.21236/ada428033.
Full textYU, DANTONG, and Shudong Jin. Arra: Tas::89 0227::Tas Recovery Act 100g Ftp: An Ultra-High Speed Data Transfer Service Over Next Generation 100 Gigabit Per Second Network. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1121761.
Full textAmerio, Silvia. Study of t$\bar{t}$ production in tau jets channel at CDFII using neural networks. Office of Scientific and Technical Information (OSTI), December 2005. http://dx.doi.org/10.2172/948188.
Full textOppel, Annalena. Beyond Informal Social Protection – Personal Networks of Economic Support in Namibia. Institute of Development Studies (IDS), November 2020. http://dx.doi.org/10.19088/ids.2020.002.
Full textRoberts, Peter M., Emily S. Schultz-Fellenz, and Richard E. Kelley. Addressing concerns related to geologic hazards at the site of the proposed Transuranic Waste Facility , TA-63, Los Alamos National Laboratory: focus on the current Los Alamos Seismic Network earthquake catalog, proximity of identified seismic events to the proposed facility , and evaluation of prev. Office of Scientific and Technical Information (OSTI), April 2012. http://dx.doi.org/10.2172/1038125.
Full text