Sciweavers

67 search results - page 8 / 14
» Analysis of communicative behaviour: Profiling roles and act...
Sort
View
ICDM
2006
IEEE
148views Data Mining» more  ICDM 2006»
14 years 1 months ago
Data Mining Approaches to Criminal Career Analysis
— Narrative reports and criminal records are stored digitally across individual police departments, enabling the collection of this data to compile a nation-wide database of crim...
Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters...
INFOCOM
1998
IEEE
13 years 11 months ago
Active Reliable Multicast
Abstract--This paper presents a novel loss recovery scheme, Active Reliable Multicast (ARM), for large-scale reliable multicast. ARM is "active" in that routers in the mu...
Li-Wei H. Lehman, Stephen J. Garland, David L. Ten...
BIB
2006
84views more  BIB 2006»
13 years 7 months ago
Computational methodologies for modelling, analysis and simulation of signalling networks
This article is a critical review of computational techniques used to model, analyse and simulate signalling networks. We propose a conceptual framework, and discuss the role of s...
David R. Gilbert, Hendrik Fuß, Xu Gu, Richar...
DESIRE
2010
13 years 2 months ago
Poetic design: an exploration of the parallels between expert poetry composition and innovative design practice
Despite parallels between the structure of poetry composition tasks and design tasks, there appears to be no previous research exploring the consequences of these correspondences ...
Erin L. Beatty, Linden J. Ball
TGC
2007
Springer
14 years 1 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou