Sciweavers

638 search results - page 77 / 128
» Competitive contagion in networks
Sort
View
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
14 years 2 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh
NCA
2007
IEEE
14 years 2 months ago
Exploiting Host Name Locality for Reduced Stretch P2P Routing
Structured P2P networks are a promising alternative for engineering new distributed services and for replacing existing distributed services like DNS. Providing competitive perfor...
Gert Pfeifer, Christof Fetzer, Thomas Hohnstein
DSN
2009
IEEE
13 years 5 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
ACL
2012
11 years 10 months ago
Tweet Recommendation with Graph Co-Ranking
As one of the most popular micro-blogging services, Twitter attracts millions of users, producing millions of tweets daily. Shared information through this service spreads faster ...
Rui Yan, Mirella Lapata, Xiaoming Li
MOBIHOC
2010
ACM
13 years 5 months ago
Near optimal multi-application allocation in shared sensor networks
Recent years have witnessed the emergence of shared sensor networks as integrated infrastructure for multiple applications. It is important to allocate multiple applications in a ...
You Xu, Abusayeed Saifullah, Yixin Chen, Chenyang ...