Sciweavers

301 search results - page 41 / 61
» Kronecker Graphs: An Approach to Modeling Networks
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das
CIKM
2011
Springer
12 years 8 months ago
Towards feature selection in network
Traditional feature selection methods assume that the data are independent and identically distributed (i.i.d.). In real world, tremendous amounts of data are distributed in a net...
Quanquan Gu, Jiawei Han
IV
2008
IEEE
296views Visualization» more  IV 2008»
14 years 3 months ago
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
Romain Bourqui, Fabien Jourdan
ICCAD
2008
IEEE
140views Hardware» more  ICCAD 2008»
14 years 5 months ago
Algorithms for simultaneous consideration of multiple physical synthesis transforms for timing closure
We propose a post-placement physical synthesis algorithm that can apply multiple circuit synthesis and placement transforms on a placed circuit to improve the critical path delay ...
Huan Ren, Shantanu Dutt
ECRA
2010
145views more  ECRA 2010»
13 years 8 months ago
Inferring preference correlations from social networks
Identifying consumer preferences is a key challenge in customizing electronic commerce sites to individual users. The increasing availability of online social networks provides on...
Tad Hogg