We discuss the use of social networks in implementing viral marketing strategies. While influence maximization has been studied in this context (see Chapter 24 of [10]), we study ...
Jason D. Hartline, Vahab S. Mirrokni, Mukund Sunda...
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
The demand for cellular data networks is expected to increase with 3G and beyond technologies accompanied by highbandwidth consumer services, such as wireless video and camera pho...
This paper develops a Semantic Web application, namely WorldWideWatch or WWWatch, in short. By employment of Semantic Web technologies, WWWatch analyses and visualizes social netwo...