Sciweavers

521 search results - page 63 / 105
» Social Network Discovery Based on Sensitivity Analysis
Sort
View
CONEXT
2008
ACM
13 years 10 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...
JIB
2007
95views more  JIB 2007»
13 years 8 months ago
Mining for Single Nucleotide Polymorphisms in Expressed Sequence Tags
As a multitude of sequence data are published, discovering polymorphisms bioinformatically becomes a valid option. In silico Single Nucleotide Polymorphism (SNP) detection is base...
E. L. Souche, B. Hellemans, J. K. J. Van Houdt, A....
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 3 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
APVIS
2006
13 years 10 months ago
Visual analysis of network centralities
Centrality analysis determines the importance of vertices in a network based on their connectivity within the network structure. It is a widely used technique to analyse network-s...
Tim Dwyer, Seok-Hee Hong, Dirk Koschützki, Fa...
WSC
2008
13 years 11 months ago
Incorporating information networks into military simulations
Information superiority is considered a critical capability for future joint forces. As advances in technology continue to boost our ability to communicate in new and different wa...
Darryl K. Ahner, Jonathon K. Alt, Francisco Baez, ...