Sciweavers

WAW
2009
Springer
187views Algorithms» more  WAW 2009»
14 years 6 months ago
Cluster Based Personalized Search
We study personalized web ranking algorithms based on the existence of document clusterings. Motivated by the topic sensitive page ranking of Haveliwala [19], we develop and imple...
Hyun Chul Lee, Allan Borodin
WAW
2009
Springer
150views Algorithms» more  WAW 2009»
14 years 6 months ago
The Giant Component in a Random Subgraph of a Given Graph
We consider a random subgraph Gp of a host graph G formed by retaining each edge of G with probability p. We address the question of determining the critical value p (as a function...
Fan Chung Graham, Paul Horn, Linyuan Lu
WAW
2009
Springer
138views Algorithms» more  WAW 2009»
14 years 6 months ago
Information Theoretic Comparison of Stochastic Graph Models: Some Experiments
The Modularity-Q measure of community structure is known to falsely ascribe community structure to random graphs, at least when it is naively applied. Although Q is motivated by a ...
Kevin J. Lang
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
14 years 6 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
WASA
2009
Springer
132views Algorithms» more  WASA 2009»
14 years 6 months ago
Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks
Abstract. This paper is motivated by exploring the impact of the number of channels on the achievable communication latency for a specific communication task. We focus on how to u...
Peng-Jun Wan, Zhu Wang, Zhiyuan Wan, Scott C.-H. H...
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
14 years 6 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
WASA
2009
Springer
189views Algorithms» more  WASA 2009»
14 years 6 months ago
Information Extraction as Link Prediction: Using Curated Citation Networks to Improve Gene Detection
Abstract. In this paper we explore the usefulness of various types of publicationrelated metadata, such as citation networks and curated databases, for the task of identifying gene...
Andrew Arnold, William W. Cohen
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
14 years 6 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
WASA
2009
Springer
165views Algorithms» more  WASA 2009»
14 years 6 months ago
Maximum Independent Set of Links under Physical Interference Model
This paper addresses the following optimization problem in a plane multihop wireless networks under the physical interference model: From a given a set of communication links whose...
Peng-Jun Wan, Xiaohua Jia, F. Frances Yao