Sciweavers

890 search results - page 141 / 178
» On the attractiveness of the star network
Sort
View
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
14 years 27 days ago
Localized construction of bounded degree and planar spanner for wireless ad hoc networks
We propose a novel localized algorithm that constructs a bounded degree and planar spanner for wireless ad hoc networks modeled by unit disk graph (UDG). Every node only has to kn...
Yu Wang 0003, Xiang-Yang Li
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
14 years 5 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
ICDCS
2009
IEEE
14 years 4 months ago
A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems
In distributed storage systems, erasure codes represent an attractive solution to add redundancy to stored data while limiting the storage overhead. They are able to provide the s...
Alessandro Duminuco, Ernst W. Biersack
WINET
2002
61views more  WINET 2002»
13 years 7 months ago
Multiple Working Points in Multichannel ALOHA with Deadlines
Abstract. This paper addresses the problem of maximizing the capacity of multichannel slotted ALOHA networks subject to a userspecified deadline and a permissible probability of ex...
Dror Baron, Yitzhak Birk
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 5 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...