Sciweavers

CORR
2011
Springer
255views Education» more  CORR 2011»
13 years 3 months ago
Link Spam Detection based on DBSpamClust with Fuzzy C-means Clustering
This Search engine became omnipresent means for ingoing to the web. Spamming Search engine is the technique to deceiving the ranking in search engine and it inflates the ranking. ...
S. K. Jayanthi, S. Sasikala
TVLSI
2010
13 years 6 months ago
Asynchronous Current Mode Serial Communication
Abstract--An asynchronous high-speed wave-pipelined bit-serial link for on-chip communication is presented as an alternative to standard bit-parallel links. The link employs the di...
Rostislav (Reuven) Dobkin, Michael Moyal, Avinoam ...
TMC
2011
119views more  TMC 2011»
13 years 6 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
ADHOC
2011
13 years 6 months ago
Evaluation and design of beaconing in mobile wireless networks
One of the intrinsic problems of mobility in wireless networks is the discovery of mobile nodes. A widely used solution for this problem is to use different variations of beacons, ...
Abbas Nayebi, Gunnar Karlsson, Hamid Sarbazi-Azad
ICIC
2009
Springer
13 years 9 months ago
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH
IEEE recently standardized 802.21-2008 Media Independent Handover (MIH) standard. MIH is a key milestone toward the evolution of integrated heterogeneous 4G wireless networks. MIH ...
Muhammad Yousaf, Sohail Bhatti, Maaz Rehan, Amir Q...
ICC
2009
IEEE
109views Communications» more  ICC 2009»
13 years 9 months ago
Loop-Free Forwarding Table Updates with Minimal Link Overflow
The forwarding paths in an IP network may change due to a link failure, network equipment maintenance, or reconfiguration of link weights. The forwarding tables in the routers need...
Lei Shi, Jing Fu, Xiaoming Fu
SRDS
2010
IEEE
13 years 9 months ago
PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer Networks
lick on the link below to access the abstract:
Santhosh Muthyapu, Sanjay Kumar Madria, Mark Linde...
IMC
2010
ACM
13 years 9 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
MONET
2008
129views more  MONET 2008»
13 years 10 months ago
Link Layer Adaptation for Shared Wireless Links
While traditional link layer protocols assume that they fully control the underlying link, in contemporary wireless networks the link may be dynamically shared by sessions belongin...
George Xylomenos, Michael Makidis
CIKM
2010
Springer
13 years 10 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...