Background: The large amount of high-throughput genomic data has facilitated the discovery of the regulatory relationships between transcription factors and their target genes. Wh...
Junhee Seok, Amit Kaushal, Ronald W. Davis, Wenzho...
The throughput of delay sensitive traffic in a Rayleigh fading network is studied by adopting a scaling limit approach. The case of study is that of a pair of nodes establishing a ...
This paper reports on a mechanism to identify temporal spatial trends in social networks. The trends of interest are defined in terms of the occurrence frequency of time stamped p...
Puteri N. E. Nohuddin, Rob Christley, Frans Coenen...
Abstract. Given a graph with billions of nodes and edges, how can we find patterns and anomalies? Are there nodes that participate in too many or too few triangles? Are there clos...
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...