Sciweavers

1985 search results - page 173 / 397
» Multiresolution Analysis of Connectivity
Sort
View
195
Voted
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
16 years 2 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen
MOBIWAC
2009
ACM
15 years 8 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 8 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
107
Voted
CDC
2008
IEEE
15 years 8 months ago
Retroactivity attenuation in transcriptional networks: Design and analysis of an insulation device
— Retroactivity is a parasitic phenomenon that changes the desired input/output response of a system when it is connected to “downstream” systems. Downstream and upstream ref...
Domitilla Del Vecchio, Shridhar Jayanthi
ICCCN
2008
IEEE
15 years 8 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz