Sciweavers

10304 search results - page 1913 / 2061
» Computer science with the sciences: an emphasis in computati...
Sort
View
MOBIHOC
2006
ACM
16 years 1 months ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
MOBIHOC
2002
ACM
16 years 1 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
MOBIHOC
2003
ACM
16 years 1 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
SDM
2009
SIAM
138views Data Mining» more  SDM 2009»
15 years 11 months ago
ShatterPlots: Fast Tools for Mining Large Graphs.
Graphs appear in several settings, like social networks, recommendation systems, computer communication networks, gene/protein biological networks, among others. A deep, recurring...
Ana Paula Appel, Andrew Tomkins, Christos Faloutso...
SDM
2009
SIAM
157views Data Mining» more  SDM 2009»
15 years 11 months ago
MUSK: Uniform Sampling of k Maximal Patterns.
Recent research in frequent pattern mining (FPM) has shifted from obtaining the complete set of frequent patterns to generating only a representative (summary) subset of frequent ...
Mohammad Al Hasan, Mohammed Javeed Zaki
« Prev « First page 1913 / 2061 Last » Next »