Sciweavers

140 search results - page 19 / 28
» Inter-arrival times of message propagation on directed netwo...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
13 years 10 months ago
Inferring networks of diffusion and influence
Information diffusion and virus propagation are fundamental processes talking place in networks. While it is often possible to directly observe when nodes become infected, observi...
Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Kra...
WWW
2009
ACM
14 years 8 months ago
Matchbox: large scale online bayesian recommendations
We present a probabilistic model for generating personalised recommendations of items to users of a web service. The Matchbox system makes use of content information in the form o...
David H. Stern, Ralf Herbrich, Thore Graepel
JNW
2007
90views more  JNW 2007»
13 years 7 months ago
A Traveling Wave based Communication Mechanism for Wireless Sensor Networks
Abstract— In this paper, we propose and evaluate a selforganizing communication mechanism for wireless sensor networks where a large number of sensor nodes are deployed. To accom...
Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murat...
SSS
2007
Springer
14 years 2 months ago
Stabilization of Loop-Free Redundant Routing
Consider a network of processes that exchange messages via FIFO communication channels. Each process chooses a subset of its neighboring processes to be its successors. Furthermore...
Jorge Arturo Cobb