Sciweavers

6906 search results - page 1128 / 1382
» An algorithm for modelling key terms
Sort
View
141
Voted
JCB
2007
118views more  JCB 2007»
15 years 4 months ago
Discovering Topological Motifs Using a Compact Notation
Discovering topological motifs or common topologies in one or more graphs is an important as well as an interesting problem. It had been classically viewed as the subgraph isomorp...
Laxmi Parida
158
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Chameleon: Adaptive Peer-to-Peer Streaming with Network Coding
—Layered streaming can be used to adapt to the available download capacity of an end-user, and such adaptation is very much required in real world HTTP media streaming. The multi...
Anh Tuan Nguyen, Baochun Li, Frank Eliassen
157
Voted
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
15 years 3 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
GROUP
2010
ACM
15 years 2 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
IMC
2010
ACM
15 years 2 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...
« Prev « First page 1128 / 1382 Last » Next »