Sciweavers

4429 search results - page 711 / 886
» An Algorithm for Knowledge Base Extraction
Sort
View
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
15 years 7 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
ICC
2007
IEEE
15 years 4 months ago
A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks
Abstract— Securing broadcast communication over sensor networks is an important research challenge. In general, broadcast communication has two important metrics: security and re...
Avinash Srinivasan, Jie Wu
INFOCOM
2007
IEEE
15 years 4 months ago
Finding Self-Similarities in Opportunistic People Networks
— Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic net...
Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruvelli...
ESA
2007
Springer
118views Algorithms» more  ESA 2007»
15 years 4 months ago
A New ILP Formulation for 2-Root-Connected Prize-Collecting Steiner Networks
We consider the real-world problem of extending a given infrastructure network in order to connect new customers. By representing the infrastructure by a single root node, this pro...
Markus Chimani, Maria Kandyba, Petra Mutzel
94
Voted
ICDCS
2005
IEEE
15 years 3 months ago
Resource-Aware Distributed Stream Management Using Dynamic Overlays
We consider distributed applications that continuously stream data across the network, where data needs to be aggregated and processed to produce a 'useful' stream of up...
Vibhore Kumar, Brian F. Cooper, Zhongtang Cai, Gre...