Sciweavers

2863 search results - page 135 / 573
» Constructing minimum-interference networks
Sort
View
MSR
2010
ACM
15 years 8 months ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...
PET
2007
Springer
15 years 9 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
103
Voted
AVSS
2006
IEEE
15 years 9 months ago
Scalable Surveillance Software Architecture
Video surveillance is a key technology for enhanced protection of facilities such as airports and power stations from various types of threat. Networks of thousands of IP-based ca...
Henry Detmold, Anthony R. Dick, Katrina E. Falkner...
AIED
2005
Springer
15 years 9 months ago
Developing a Bayes-net based student model for an External Representation Selection Tutor
Abstract. This paper describes the process by which we are constructing an intelligent tutoring system (ERST) designed to improve learners’ external representation (ER) selection...
Beate Grawemeyer, Richard Cox
WDAG
2005
Springer
102views Algorithms» more  WDAG 2005»
15 years 8 months ago
Papillon: Greedy Routing in Rings
We study greedy routing over n nodes placed in a ring, with the distance between two nodes defined to be the clockwise or the absolute distance between them along the ring. Such ...
Ittai Abraham, Dahlia Malkhi, Gurmeet Singh Manku