Sciweavers

694 search results - page 108 / 139
» Analysis of a Location-Based Social Network
Sort
View
ICDCS
2008
IEEE
14 years 3 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
SBIA
2000
Springer
14 years 7 days ago
User profiling with Case-Based Reasoning and Bayesian Networks
Agent technology provides many services to users. The tasks in which agents are involved include information filtering, information retrieval, user's tasks automation, browsin...
Silvia N. Schiaffino, Analía Amandi
WINE
2010
Springer
162views Economy» more  WINE 2010»
13 years 6 months ago
Near-Strong Equilibria in Network Creation Games
We introduce a new solution concept for games, near-strong equilibrium, a variation of strong equilibrium. Previous work has shown the existence of 2-strong pure strategy equilibr...
Ola Rozenfeld, Moshe Tennenholtz
CPAIOR
2007
Springer
14 years 2 months ago
Connections in Networks: Hardness of Feasibility Versus Optimality
We study the complexity of combinatorial problems that consist of competing infeasibility and optimization components. In particular, we investigate the complexity of the connectio...
Jon Conrad, Carla P. Gomes, Willem Jan van Hoeve, ...
SIGSOFT
2008
ACM
14 years 9 months ago
Can developer-module networks predict failures?
Software teams should follow a well defined goal and keep their work focused. Work fragmentation is bad for efficiency and quality. In this paper we empirically investigate the re...
Martin Pinzger, Nachiappan Nagappan, Brendan Murph...