Research on Path Completion Technique in Web Usage Mining

  • Authors:
  • Yan Li;Boqin Feng;Qinjiao Mao

  • Affiliations:
  • -;-;-

  • Venue:
  • ISCSCT '08 Proceedings of the 2008 International Symposium on Computer Science and Computational Technology - Volume 01
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which ...