Sciweavers

1541 search results - page 133 / 309
» Analysis of Random Noise and Random Walk Algorithms
Sort
View
INTR
2002
50views more  INTR 2002»
15 years 4 months ago
Methodologies for crawler based Web surveys
There have been many attempts to study the content of the web, either through human or automatic agents. Five different previously used web survey methodologies are described and ...
Mike Thelwall
145
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks
—This paper studies the delay constrained multicast capacity of large scale mobile ad hoc networks (MANETs). We consider a MANET that consists of ns multicast sessions. Each mult...
Shan Zhou, Lei Ying
ICMCS
2009
IEEE
131views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Web image mining using concept sensitive Markov stationary features
With the explosive growth of web resources, how to mine semantically relevant images efficiently becomes a challenging and necessary task. In this paper, we propose a concept sens...
Chunjie Zhang, Jing Liu, Hanqing Lu, Songde Ma
SIAMCOMP
2002
112views more  SIAMCOMP 2002»
15 years 4 months ago
The Efficiency of Resolution and Davis--Putnam Procedures
We consider several problems related to the use of resolution-based methods for determining whether a given boolean formula in conjunctive normal form is satisfiable. First, build...
Paul Beame, Richard M. Karp, Toniann Pitassi, Mich...
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
15 years 11 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel