Sciweavers

865 search results - page 30 / 173
» Performance Analysis of the Reactor Pattern in Network Servi...
Sort
View
CIKM
2011
Springer
12 years 8 months ago
Structural link analysis and prediction in microblogs
With hundreds of millions of participants, social media services have become commonplace. Unlike a traditional social network service, a microblogging network like Twitter is a hy...
Dawei Yin, Liangjie Hong, Brian D. Davison
LCN
2002
IEEE
14 years 1 months ago
A New Location Management Strategy Based on User Mobility Pattern for Wireless Networks
For a wireless network to effectively deliver services to the mobile users, it must have an efficient way to track them. The location management fulfills this task through locat...
Wenchao Ma, Yuguang Fang
ICC
2008
IEEE
127views Communications» more  ICC 2008»
14 years 3 months ago
Delay Analysis of Distributed Reservation Protocol with UWB Shadowing Channel for WPAN
— Ultra-wideband (UWB) technology is expected to provide high data rate services for future wireless personal area networks (WPANs). The WiMedia Alliance recently has launched it...
Kuang-Hao Liu, Xuemin Shen, Ruonan Zhang, Lin Cai
APNOMS
2006
Springer
14 years 16 days ago
Temporal Patterns and Properties in Multiple-Flow Interactions
It is widely recognized that today's Internet traffic is mostly carried by a relatively small number of elephant flows while mice flows constitute up to 80% of all active flow...
Marat Zhanikeev, Yoshiaki Tanaka
CCS
2008
ACM
13 years 10 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers