Sciweavers

1238 search results - page 141 / 248
» Knowledge Extraction from Local Function Networks
Sort
View
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 10 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
SIGCOMM
1994
ACM
14 years 1 months ago
Improved Algorithms for Synchronizing Computer Network Clocks
The Network Time Protocol (NTP) is widely deployed in the Internet to synchronize computer clocks to each other and to international standards via telephone modem, radio and satel...
David L. Mills
PKDD
2009
Springer
134views Data Mining» more  PKDD 2009»
14 years 3 months ago
Mining Graph Evolution Rules
In this paper we introduce graph-evolution rules, a novel type of frequency-based pattern that describe the evolution of large networks over time, at a local level. Given a sequenc...
Michele Berlingerio, Francesco Bonchi, Björn ...
BMCBI
2007
141views more  BMCBI 2007»
13 years 9 months ago
Reconstruction of human protein interolog network using evolutionary conserved network
Background: The recent increase in the use of high-throughput two-hybrid analysis has generated large quantities of data on protein interactions. Specifically, the availability of...
Tao-Wei Huang, Chung-Yen Lin, Cheng-Yan Kao
SIGCOMM
2009
ACM
14 years 3 months ago
A programmable overlay router for service provider innovation
The threat of commoditization poses a real challenge for service providers. While the end-to-end principle is often paraphrased as “dumb network, smart end-systems”, the origi...
Bruce S. Davie, Jan Medved