Sciweavers

815 search results - page 151 / 163
» Social network analysis and interactive device design analys...
Sort
View
SDM
2009
SIAM
192views Data Mining» more  SDM 2009»
14 years 4 months ago
Mining Cohesive Patterns from Graphs with Feature Vectors.
The increasing availability of network data is creating a great potential for knowledge discovery from graph data. In many applications, feature vectors are given in addition to g...
Arash Rafiey, Flavia Moser, Martin Ester, Recep Co...
ICDCS
2009
IEEE
14 years 4 months ago
The Digital Marauder's Map: A New Threat to Location Privacy
“The Marauder’s Map” is a magical map in J. K. Rowling’s fantasy series, “Harry Potter and the Prisoner of Azkaban”. It shows all moving objects within the “Hogwarts...
Xinwen Fu, Nan Zhang 0004, Aniket Pingley, Wei Yu,...
WSC
1997
13 years 8 months ago
A Hybrid Tool for the Performance Evaluation of NUMA Architectures
We present a system for describing and solving closed queuing network models of the memory access performance of NUMA architectures. The system consists of a model description lan...
James Westall, Robert Geist
SIGCOMM
2004
ACM
14 years 28 days ago
Network sensitivity to hot-potato disruptions
Hot-potato routing is a mechanism employed when there are multiple (equally good) interdomain routes available for a given destination. In this scenario, the Border Gateway Protoc...
Renata Teixeira, Aman Shaikh, Timothy Griffin, Geo...
MOBIHOC
2005
ACM
14 years 7 months ago
Power balanced coverage-time optimization for clustered wireless sensor networks
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Tao Shu, Marwan Krunz, Sarma B. K. Vrudhula