Sciweavers

3122 search results - page 590 / 625
» A Theory of Network Equivalence
Sort
View
CORR
2006
Springer
81views Education» more  CORR 2006»
14 years 9 months ago
The Workshop on Internet Topology (WIT) Report
Internet topology analysis has recently experienced a surge of interest in computer science, physics, and the mathematical sciences. However, researchers from these different disc...
Dmitri V. Krioukov, Fan R. K. Chung, Kimberly C. C...
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
ANCS
2009
ACM
14 years 7 months ago
Design and performance analysis of a DRAM-based statistics counter array architecture
The problem of maintaining efficiently a large number (say millions) of statistics counters that need to be updated at very high speeds (e.g. 40 Gb/s) has received considerable re...
Haiquan (Chuck) Zhao, Hao Wang, Bill Lin, Jun (Jim...
ICONFERENCE
2011
14 years 4 months ago
Blogs: spinning a web of virality
The aim of this study is to understand the role of bloggers in driving viral information. More specifically, we develop a new methodology that creates a map of the „life cycleâ€...
Karine Nahon, Jeff Hemsley, Shawn Walker, Muzammil...
CODASPY
2011
14 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong