—Analysis and modeling of wireless networks greatly depend on understanding the structure of underlying mobile nodes. In this paper we present two clustering algorithms to determ...
Yung-Chih Chen, Elisha J. Rosensweig, Jim Kurose, ...
In this paper we describe our analysis of a real trace and propose a mobility model. The trace data we used for this study was collected from a military experiment carried out in L...
Xiaofeng Lu, Yung-chih Chen, Ian X. Y. Leung, Zhan...
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand ...
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun ...
When utilizing reconfigurable hardware there are many applications that will require more memory than is available in a single hardware block. While FPGAs have tools and mechanisms...
Predictive modelling of online dynamic user-interaction recordings and community identifi cation from such data b ecomes more and more imp ortant w ith th e w idesp read use of on...