Sciweavers

1078 search results - page 174 / 216
» Networks with Small Stretch Number
Sort
View
126
Voted
KDD
2009
ACM
182views Data Mining» more  KDD 2009»
16 years 4 months ago
Scalable graph clustering using stochastic flows: applications to community discovery
Algorithms based on simulating stochastic flows are a simple and natural solution for the problem of clustering graphs, but their widespread use has been hampered by their lack of...
Venu Satuluri, Srinivasan Parthasarathy
129
Voted
ICDCS
2009
IEEE
16 years 26 days ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
110
Voted
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
16 years 18 days ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...
142
Voted
SAC
2009
ACM
15 years 10 months ago
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang
139
Voted
GLVLSI
2009
IEEE
92views VLSI» more  GLVLSI 2009»
15 years 10 months ago
Online circuit reliability monitoring
In this work we propose an online reliability tracking framework that utilizes a hybrid network of on-chip temperature and delay sensors together with a circuit reliability macrom...
Bin Zhang