Sciweavers

136 search results - page 27 / 28
» Some characterizations based on double aggregation operators
Sort
View
125
Voted
WSC
2001
15 years 4 months ago
Satellite communications representation in network simulation
This paper presents methodologies to represent satellite communications (SATCOM) behaviors in network simulation. This paper is based on tasks performed for generic network warfar...
Kenneth Y. Jo
115
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 25 days ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
WWW
2005
ACM
16 years 4 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
146
Voted
MOBICOM
2000
ACM
15 years 7 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
165
Voted
GI
2009
Springer
15 years 1 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser