Sciweavers

711 search results - page 87 / 143
» Methodological frameworks for large-scale network analysis a...
Sort
View
KDD
2009
ACM
164views Data Mining» more  KDD 2009»
14 years 9 months ago
Social influence analysis in large-scale networks
In large social networks, nodes (users, entities) are influenced by others for various reasons. For example, the colleagues have strong influence on one's work, while the fri...
Jie Tang, Jimeng Sun, Chi Wang, Zi Yang
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
14 years 2 months ago
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Karthik Lakshmanan, Gaurav Bhatia, Ragunathan Rajk...
CIT
2004
Springer
14 years 2 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
LREC
2008
108views Education» more  LREC 2008»
13 years 10 months ago
Design of a Multimodal Database for Research on Automatic Detection of Severe Apnoea Cases
The aim of this paper is to present the design of a multimodal database suitable for research on new possibilities for automatic diagnosis of patients with severe obstructive slee...
Rubén Fernández Pozo, Luis A. Hern&a...
SIGOPSE
2004
ACM
14 years 2 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase