Sciweavers

708 search results - page 141 / 142
» A study of graph spectra for comparing graphs and trees
Sort
View
SIGCOMM
2010
ACM
13 years 5 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
BMCBI
2010
129views more  BMCBI 2010»
13 years 5 months ago
Uncovering packaging features of co-regulated modules based on human protein interaction and transcriptional regulatory networks
Background: Network co-regulated modules are believed to have the functionality of packaging multiple biological entities, and can thus be assumed to coordinate many biological fu...
Lina Chen, Hong Wang, Liangcai Zhang, Wan Li, Qian...
TON
2010
152views more  TON 2010»
13 years 3 months ago
1 + N network protection for mesh networks: network coding-based protection using p-cycles
—p-Cycles have been proposed for preprovisioned 1 : N protection in optical mesh networks. Although the protection circuits are preconfigured, the detection of failures and the ...
Ahmed E. Kamal
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 3 months ago
Gaussian Process Structural Equation Models with Latent Variables
In a variety of disciplines such as social sciences, psychology, medicine and economics, the recorded data are considered to be noisy measurements of latent variables connected by...
Ricardo Silva
PE
2011
Springer
167views Optimization» more  PE 2011»
12 years 12 months ago
Passage-time computation and aggregation strategies for large semi-Markov processes
High-level semi-Markov modelling paradigms such as semi-Markov stochastic Petri nets and process algebras are used to capture realistic performance models of computer and communic...
Marcel C. Guenther, Nicholas J. Dingle, Jeremy T. ...