Sciweavers

1488 search results - page 286 / 298
» Botnets for Scalable Management
Sort
View
CIKM
2008
Springer
14 years 11 months ago
Mining social networks using heat diffusion processes for marketing candidates selection
Social Network Marketing techniques employ pre-existing social networks to increase brands or products awareness through word-of-mouth promotion. Full understanding of social netw...
Hao Ma, Haixuan Yang, Michael R. Lyu, Irwin King
CIKM
2008
Springer
14 years 11 months ago
Tag-geotag correlation in social networks
This paper presents an analysis of the correlation of annotated information unit (textual) tags and geographical identification metadata geotags. Despite the increased usage of ge...
Sang Su Lee, Dongwoo Won, Dennis McLeod
CP
2008
Springer
14 years 11 months ago
A Constraint Programming Approach for Allocation and Scheduling on the CELL Broadband Engine
The Cell BE processor provides both scalable computation power and flexibility, and it is already being adopted for many computational intensive applications like aerospace, defens...
Luca Benini, Michele Lombardi, Michela Milano, Mar...
DIM
2008
ACM
14 years 11 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
CIDR
2007
116views Algorithms» more  CIDR 2007»
14 years 11 months ago
Life beyond Distributed Transactions: an Apostate's Opinion
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
Pat Helland