Sciweavers

1985 search results - page 173 / 397
» Multiresolution Analysis of Connectivity
Sort
View
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
14 years 10 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen
MOBIWAC
2009
ACM
14 years 4 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
CDC
2008
IEEE
14 years 4 months ago
Retroactivity attenuation in transcriptional networks: Design and analysis of an insulation device
— Retroactivity is a parasitic phenomenon that changes the desired input/output response of a system when it is connected to “downstream” systems. Downstream and upstream ref...
Domitilla Del Vecchio, Shridhar Jayanthi
ICCCN
2008
IEEE
14 years 4 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz