Sciweavers

2357 search results - page 471 / 472
» Computing Refactorings of Behavior Models
Sort
View
WINET
2002
144views more  WINET 2002»
13 years 6 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
CGF
2010
142views more  CGF 2010»
13 years 5 months ago
Toward a Lagrangian Vector Field Topology
In this paper we present an extended critical point concept which allows us to apply vector field topology in the case of unsteady flow. We propose a measure for unsteadiness wh...
Raphael Fuchs, Jan Kemmler, Benjamin Schindler, J&...
CIKM
2010
Springer
13 years 5 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...
CIKM
2010
Springer
13 years 5 months ago
You are where you tweet: a content-based approach to geo-locating twitter users
We propose and evaluate a probabilistic framework for estimating a Twitter user’s city-level location based purely on the content of the user’s tweets, even in the absence of ...
Zhiyuan Cheng, James Caverlee, Kyumin Lee
CCS
2010
ACM
13 years 4 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...