Sciweavers

274 search results - page 35 / 55
» Identifying sets of key players in a social network
Sort
View
BMCBI
2010
96views more  BMCBI 2010»
13 years 7 months ago
A statistical framework for differential network analysis from microarray data
Background: It has been long well known that genes do not act alone; rather groups of genes act in consort during a biological process. Consequently, the expression levels of gene...
Ryan Gill, Somnath Datta, Susmita Datta
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
14 years 25 days ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
FLAIRS
2010
13 years 9 months ago
Meta-Prediction for Collective Classification
When data instances are inter-related, as are nodes in a social network or hyperlink graph, algorithms for collective classification (CC) can significantly improve accuracy. Recen...
Luke McDowell, Kalyan Moy Gupta, David W. Aha
COLCOM
2008
IEEE
13 years 9 months ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao
CNSR
2005
IEEE
100views Communications» more  CNSR 2005»
13 years 9 months ago
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks
Distributed Hash Tables (DHTs) promise to manage huge sets of key-value pairs in a Peer-to-Peer manner. The Content-Addressable Network (CAN) is a prominent variant of DHT. A crit...
Thomas Reidemeister, Klemens Böhm, Paul A. S....