Sciweavers

3319 search results - page 601 / 664
» The topology of dark networks
Sort
View
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
14 years 3 months ago
New perspectives and methods in link prediction
This paper examines important factors for link prediction in networks and provides a general, high-performance framework for the prediction task. Link prediction in sparse network...
Ryan Lichtenwalter, Jake T. Lussier, Nitesh V. Cha...
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
14 years 2 months ago
Evolving a real-world vehicle warning system
Many serious automobile accidents could be avoided if drivers were warned of impending crashes before they occur. Creating such warning systems by hand, however, is a difficult an...
Nate Kohl, Kenneth O. Stanley, Risto Miikkulainen,...
NGC
2000
Springer
14 years 2 months ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
EENERGY
2010
14 years 2 months ago
Energy-aware traffic engineering
Energy consumption of the Internet is already substantial and it is likely to increase as operators deploy faster equipment to handle popular bandwidthintensive services, such as ...
Nedeljko Vasic, Dejan Kostic
EUROCRYPT
2008
Springer
14 years 29 days ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky