Sciweavers

239 search results - page 32 / 48
» Random walks in a supply network
Sort
View
KDD
2010
ACM
318views Data Mining» more  KDD 2010»
13 years 5 months ago
DivRank: the interplay of prestige and diversity in information networks
Information networks are widely used to characterize the relationships between data items such as text documents. Many important retrieval and mining tasks rely on ranking the dat...
Qiaozhu Mei, Jian Guo, Dragomir R. Radev
TON
2008
149views more  TON 2008»
13 years 7 months ago
Building heterogeneous peer-to-peer networks: protocol and analysis
In this paper, we propose a simple protocol for building heterogeneous unstructured peer-to-peer (P2P) networks. The protocol consists of two parts--the joining process and the reb...
Kin Wah Kwong, Danny H. K. Tsang
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
14 years 7 months ago
Measuring and extracting proximity in networks
Measuring distance or some other form of proximity between objects is a standard data mining tool. Connection subgraphs were recently proposed as a way to demonstrate proximity be...
Yehuda Koren, Stephen C. North, Chris Volinsky
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
14 years 2 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
IPPS
2006
IEEE
14 years 1 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi