Sciweavers

108 search results - page 13 / 22
» Identification and Evaluation of Weak Community Structures i...
Sort
View
ENTER
2006
Springer
13 years 11 months ago
From Information Behaviour of Independent Travellers to Requirements for Information Systems
The complexity and dynamic nature of travelling offers many opportunities for technological support. But printed guidebooks remain the typical companion, despite many weaknesses. ...
Marco Prestipino
SIGCOMM
2010
ACM
13 years 7 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
TC
2010
13 years 5 months ago
The Design and Evaluation of a Self-Organizing Superpeer Network
—Superpeer architectures exploit the heterogeneity of nodes in a peer-to-peer (P2P) network by assigning additional responsibilities to higher capacity nodes. In the design of a ...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
ASIAN
2004
Springer
153views Algorithms» more  ASIAN 2004»
13 years 11 months ago
Chi-Square Matrix: An Approach for Building-Block Identification
This paper presents a line of research in genetic algorithms (GAs), called building-block identification. The building blocks (BBs) are common structures inferred from a set of sol...
Chatchawit Aporntewan, Prabhas Chongstitvatana
SAC
2006
ACM
14 years 1 months ago
Mining and analyzing the topological structure of protein-protein interaction networks
We report a comprehensive evaluation of the topological structure of protein-protein interaction (PPI) networks by mining and analyzing graphs constructed from the publicly availa...
Daniel Duanqing Wu, Xiaohua Hu