Sciweavers

100 search results - page 15 / 20
» A Critical Review of Centrality Measures in Social Networks
Sort
View
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 7 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
ICC
2008
IEEE
102views Communications» more  ICC 2008»
14 years 1 months ago
Geometric Random Linear Codes in Sensor Networks
—Wireless sensor networks consist of unreliable and energy-constrained sensors connecting to each other wirelessly. As measured data may be lost due to sensor failures, maintaini...
Yunfeng Lin, Ben Liang, Baochun Li
ISI
2004
Springer
14 years 26 days ago
Analyzing and Visualizing Criminal Network Dynamics: A Case Study
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...
JAISE
2010
163views Algorithms» more  JAISE 2010»
13 years 2 months ago
Affective negotiation support systems
Negotiation is a process in which two or more parties aim to reach a joint agreement. As such negotiation involves rational decision making about options and issues. However, negot...
Joost Broekens, Catholijn M. Jonker, John-Jules Ch...
MSR
2011
ACM
12 years 10 months ago
Do time of day and developer experience affect commit bugginess
Modern software is often developed over many years with hundreds of thousands of commits. Commit metadata is a rich source of social characteristics, including the commit’s time...
Jon Eyolfson, Lin Tan, Patrick Lam