Sciweavers

828 search results - page 154 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
WWW
2011
ACM
14 years 6 months ago
Counting triangles and the curse of the last reducer
The clustering coefficient of a node in a social network is a fundamental measure that quantifies how tightly-knit the community is around the node. Its computation can be reduce...
Siddharth Suri, Sergei Vassilvitskii
100
Voted
ICDCSW
2008
IEEE
15 years 6 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
COMPSAC
2007
IEEE
15 years 6 months ago
Performance Prediction of Service-Oriented Applications based on an Enterprise Service Bus
An Enterprise Service Bus (ESB) is a standards-based integration platform that combines messaging, web services, data transformation, and intelligent routing in a highly distribut...
Yan Liu, Ian Gorton, Liming Zhu
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
STACS
2007
Springer
15 years 5 months ago
Broadcasting vs. Mixing and Information Dissemination on Cayley Graphs
One frequently studied problem in the context of information dissemination in communication networks is the broadcasting problem. In this paper, we study the following randomized b...
Robert Elsässer, Thomas Sauerwald