Sciweavers

26354 search results - page 3 / 5271
» How we refactor, and how we know it
Sort
View
CORR
2011
Springer
168views Education» more  CORR 2011»
12 years 9 months ago
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
— This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on realworld link predictio...
Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubin...
IC
2003
13 years 7 months ago
Sampling Internet Topologies: How Small Can We Go?
Abstract— In this paper, we develop methods to “sample” a large real network into a small realistic graph. Although topology modeling has received a lot attention lately, it ...
Vaishnavi Krishnamurthy, Junhong Sun, Michalis Fal...
INFOCOM
2008
IEEE
14 years 5 days ago
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
MVA
2008
201views Computer Vision» more  MVA 2008»
13 years 5 months ago
How close are we to solving the problem of automated visual surveillance?
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing three conferences or workshops and special issues of two major journals devoted to...
Hannah M. Dee, Sergio A. Velastin
COMAD
2008
13 years 7 months ago
Information Integration Across Heterogeneous Sources: Where Do We Stand and How to Proceed?
Today, information integration has assumed a completely different, complex connotation than what it used to be. The advent of the Internet, the proliferation of information source...
Aditya Telang, Sharma Chakravarthy, Yan Huang