Sciweavers

355 search results - page 19 / 71
» Evaluation of Optimization Methods for Network Bottleneck Di...
Sort
View
KES
2005
Springer
14 years 1 months ago
Detecting Search Engine Spam from a Trackback Network in Blogspace
Abstract. We aim to develop a technique to detect search engine optimization (SEO) spam websites. Specifically, we propose four methods for extracting the SEO spam entries from a ...
Masahiro Kimura, Kazumi Saito, Kazuhiro Kazama, Sh...
BMCBI
2008
142views more  BMCBI 2008»
13 years 7 months ago
Optimal neighborhood indexing for protein similarity search
Background: Similarity inference, one of the main bioinformatics tasks, has to face an exponential growth of the biological data. A classical approach used to cope with this data ...
Pierre Peterlongo, Laurent Noé, Dominique L...
ICCAD
1993
IEEE
123views Hardware» more  ICCAD 1993»
13 years 12 months ago
Optimal sizing of high-speed clock networks based on distributed RC and lossy transmission line models
We have proposed an e cient measure to reduce the clock skew by assigning the clock network with variable branch widths. This measure has long been used for \H" clock tree. T...
Qing Zhu, Wayne Wei-Ming Dai, Joe G. Xi
INFOCOM
1997
IEEE
13 years 12 months ago
Integrated Rate and Credit Feedback Control for ABR Service in ATM Networks
We propose a ow-control scheme that combines the merits of credit- and rate-based ow-control schemes by applying direct control over both bandwidth and bu er resources. The goal...
Xi Zhang, Kang G. Shin, Qin Zheng
GIS
2009
ACM
14 years 8 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku