Sciweavers

421 search results - page 47 / 85
» Game-Theoretic Models of Information Overload in Social Netw...
Sort
View
LCN
2000
IEEE
14 years 3 days ago
Performance Measurements and Analysis of TCP Flows in a Differentiated Services WAN
Abstract—This paper presents results from performance measurements carried out in a Differentiated Services WAN connecting three major cities in Southern Finland. The target of t...
Jarmo Harju, Yevgeni Koucheryavy, Juha Laine, Samp...
KDD
2010
ACM
250views Data Mining» more  KDD 2010»
13 years 9 months ago
On community outliers and their efficient detection in information networks
Linked or networked data are ubiquitous in many applications. Examples include web data or hypertext documents connected via hyperlinks, social networks or user profiles connected...
Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Su...
SBACPAD
2005
IEEE
177views Hardware» more  SBACPAD 2005»
14 years 1 months ago
Automatic Data-Flow Graph Generation of MPI Programs
The Data-Flow Graph (DFG) of a parallel application is frequently used to take scheduling decisions, based on the information that it models (dependencies among the tasks and volu...
Rafael Ennes Silva, Guilherme P. Pezzi, Nicolas Ma...
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
14 years 1 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 8 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau