Sciweavers

1639 search results - page 149 / 328
» Degree-constrained network flows
Sort
View
ECIR
2010
Springer
15 years 6 months ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang
ANOR
2005
102views more  ANOR 2005»
15 years 4 months ago
Locating Active Sensors on Traffic Networks
Sensors are used to monitor traffic in networks. For example, in transportation networks, they may be used to measure traffic volumes on given arcs and paths of the network. This p...
Monica Gentili, Pitu B. Mirchandani
GI
2009
Springer
15 years 2 months ago
DiversityMobile - Mobile Data Retrieval Platform for Biodiversity Research Projects
: A majority of biodiversity research projects depend on field recording and ecology data. Therefore it is important to provide a seamless and transparent data flow from the field ...
Stefan Jablonski, Alexandra Kehl, Dieter Neubacher...
CCS
2009
ACM
16 years 5 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
DAC
1996
ACM
15 years 8 months ago
A System Design Methodology for Software/Hardware Co-Development of Telecommunication Network Applications
In this paper, we describe a system design methodology for the concurrent development of hybrid software/hardware systems for telecom network applications. This methodology is bas...
Bill Lin