Sciweavers

4099 search results - page 801 / 820
» First Class Patterns
Sort
View
CCR
2010
184views more  CCR 2010»
13 years 7 months ago
Characterising temporal distance and reachability in mobile and online social networks
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
CCR
2008
118views more  CCR 2008»
13 years 7 months ago
A generic language for application-specific flow sampling
Flow records gathered by routers provide valuable coarse-granularity traffic information for several measurement-related network applications. However, due to high volumes of traf...
Harsha V. Madhyastha, Balachander Krishnamurthy
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 7 months ago
On the bias of BFS
Abstract--Breadth First Search (BFS) and other graph traversal techniques are widely used for measuring large unknown graphs, such as online social networks. It has been empiricall...
Maciej Kurant, Athina Markopoulou, Patrick Thiran
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 7 months ago
Supporting Acquisition of Basic Skills
ors induce aptitudes: abstract skills and knowledge. Mentors foster attitudes: social skills and graces. In my experience of school, starting 70 years or so ago, quite regimented i...
W. Neville Holmes
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 7 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh