Sciweavers

70 search results - page 12 / 14
» Detecting Deceptive Groups Using Conversations and Network A...
Sort
View
138
Voted
ICCCN
2007
IEEE
15 years 5 months ago
Exploring Load-Balance to Dispatch Mobile Sensors in Wireless Sensor Networks
In this paper, a hybrid sensor network consisting of static and mobile sensors is considered, where static sensors are used to detect events, and mobile sensors can move to event l...
You-Chiun Wang, Wen-Chih Peng, Min-Hsien Chang, Yu...
115
Voted
BMCBI
2010
101views more  BMCBI 2010»
15 years 1 months ago
Enrichment of homologs in insignificant BLAST hits by co-complex network alignment
Background: Homology is a crucial concept in comparative genomics. The algorithm probably most widely used for homology detection in comparative genomics, is BLAST. Usually a stri...
Like Fokkens, Sandra M. C. Botelho, Jos Boekhorst,...
135
Voted
CEAS
2008
Springer
15 years 3 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
123
Voted
ICCV
2011
IEEE
14 years 1 months ago
Inferring Social Relations from Visual Concepts
In this paper, we study the problem of social relational inference using visual concepts which serve as indicators of actors’ social interactions. While social network analysis ...
Lei Ding, Alper Yilmaz
104
Voted
IMC
2006
ACM
15 years 7 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...