Sciweavers

243 search results - page 14 / 49
» Personalizing routes
Sort
View
MINENET
2006
ACM
14 years 4 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
IEEEHPCS
2010
13 years 8 months ago
An experimental study of greedy routing algorithms
The “small world” phenomenon, i.e., the fact that the global social network is strongly connected in the sense that every two persons are inter-related through a small chain o...
Stavros Athanassopoulos, Christos Kaklamanis, Ilia...
CGF
2008
120views more  CGF 2008»
13 years 10 months ago
COPERNICUS: Context-Preserving Engine for Route Navigation with Interactive User-modifiable Scaling
In this paper, we present an automated system for generating context-preserving route maps that depict navigation routes as a path between nodes and edges inside a topographic net...
Hartmut Ziegler, Daniel A. Keim
ICDE
2009
IEEE
140views Database» more  ICDE 2009»
13 years 8 months ago
Routing Questions to the Right Users in Online Communities
Online forums contain huge amounts of valuable user-generated content. In current forum systems, users have to passively wait for other users to visit the forum systems and read/an...
Yanhong Zhou, Gao Cong, Bin Cui, Christian S. Jens...
ISPAN
1999
IEEE
14 years 2 months ago
Complete Exchange Algorithms in Wormhole-Routed Torus Networks: A Divide-and-Conquer Strategy
We present efficient all-to-all personalized communication algorithms for a 2D torus in wormhole-routed networks. Our complete exchange algorithm adopts divide-and-conquer approac...
Si-Gwan Kim, Seung Ryoul Maeng, Jung Wan Cho