Sciweavers

2678 search results - page 448 / 536
» Voting in social networks
Sort
View
ISI
2005
Springer
14 years 2 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
14 years 2 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
HUMAN
2003
Springer
14 years 2 months ago
Analysis of User Utility Function in the Combined Cellular/WLAN Environments
Recent advances in wireless networking technologies enabled nomadic users connected to the Internet anywhere from the outdoor environments such as airport, hotel, subway station, o...
Jae-Hwan Kim, Young Yong Kim
SODA
2007
ACM
115views Algorithms» more  SODA 2007»
13 years 10 months ago
Strong price of anarchy
A strong equilibrium (Aumann 1959) is a pure Nash equilibrium which is resilient to deviations by coalitions. We define the strong price of anarchy to be the ratio of the worst c...
Nir Andelman, Michal Feldman, Yishay Mansour
IADIS
2004
13 years 10 months ago
A quality of service aware Web server
This paper addresses two questions. Firstly, how is it possible for an application to become aware of network conditions and secondly, given this awareness, how can a system be de...
Kristoffer Getchell, Martin Bateman, Colin Allison...