Sciweavers

151 search results - page 7 / 31
» Cleaning a network with brushes
Sort
View
23
Voted
IV
2006
IEEE
111views Visualization» more  IV 2006»
14 years 1 months ago
Mapping Scientific Disciplines and Author Expertise Based on Personal Bibliography Files
This paper presents a novel approach (1) to define, analyze, and map a scientific discipline and (2) to compare and map the expertise of single authors based on personal bibliogra...
Colin Murray, Weimao Ke, Katy Börner
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 7 months ago
Verifiable Network-Performance Measurements
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a con...
Katerina J. Argyraki, Petros Maniatis, Ankit Singl...
CSE
2009
IEEE
13 years 11 months ago
Clustering Signature in Complex Social Networks
An important aspect in social computing is the structure of social networks, which build the underlying substrate for the exchange of information. With the growing importance of mi...
Ueli Peter, Tomas Hruz
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 29 days ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 1 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...