Sciweavers

108 search results - page 21 / 22
» A Parallelism-Based Approach to Network Anonymization
Sort
View
ICML
2007
IEEE
14 years 7 months ago
Scalable modeling of real graphs using Kronecker multiplication
Given a large, real graph, how can we generate a synthetic graph that matches its properties, i.e., it has similar degree distribution, similar (small) diameter, similar spectrum,...
Jure Leskovec, Christos Faloutsos
VLDB
2009
ACM
165views Database» more  VLDB 2009»
14 years 6 months ago
Online pairing of VoIP conversations
This paper answers the following question; given a multiplicity of evolving 1-way conversations, can a machine or an algorithm discern the conversational pairs in an online fashio...
Michail Vlachos, Aris Anagnostopoulos, Olivier Ver...
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 8 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
13 years 11 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
JLBS
2007
130views more  JLBS 2007»
13 years 6 months ago
Mobile positioning for traffic state acquisition
: The topics presented in this paper regard the project “Data Optimisation for integrated Telematics” (Do-iT) granted by the German ministry of economics and technology. Within...
Katrin Ramm, Volker Schwieger