Sciweavers

31 search results - page 6 / 7
» Analysis of the Information Propagation Time Among Mobile Ho...
Sort
View
JNCA
2008
154views more  JNCA 2008»
13 years 4 months ago
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility
Bluetooth technology is specially designed for the wireless personal area networks to replace cable. Several challenges exist in Bluetooth scatternet formation and routing, since ...
Prasan Kumar Sahoo, Chih-Yung Chang, Sheng-Wen Cha...
ISSTA
2000
ACM
13 years 9 months ago
Which pointer analysis should I use?
During the past two decades many di erent pointer analysis algorithms have been published. Although some descriptions include measurements of the e ectiveness of the algorithm, qu...
Michael Hind, Anthony Pioli
AAAI
2007
13 years 7 months ago
Analyzing Reading Behavior by Blog Mining
This paper presents a study of the various aspects of blog reading behavior. The analyzed data are obtained from a Japanese weblog hosting service, Doblog. Four kinds of social ne...
Tadanobu Furukawa, Mitsuru Ishizuka, Yutaka Matsuo...
CIVR
2008
Springer
221views Image Analysis» more  CIVR 2008»
13 years 6 months ago
Annotation suggestion and search for personal multimedia objects on the web
The number of personal multimedia objects, such as digital photographs and videos, are exploding on the web through popular sites such as Flickr, YouTube, and FaceBook hosting bil...
Brendan Elliott, Z. Meral Özsoyoglu
ACMSE
2008
ACM
13 years 7 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins