Sciweavers

1391 search results - page 264 / 279
» Distributed routing in networks using affinity propagation
Sort
View
OSN
2008
97views more  OSN 2008»
14 years 11 months ago
Managing Layer 1 VPN services
Control Plane architectures enhance transport networks with distributed signaling and routing mechanisms which allow dynamic connection control. As a result, layer 1 switching net...
Neumar Malheiros, Edmundo Roberto Mauro Madeira, F...
STOC
2007
ACM
127views Algorithms» more  STOC 2007»
16 years 1 days ago
First to market is not everything: an analysis of preferential attachment with fitness
The design of algorithms on complex networks, such as routing, ranking or recommendation algorithms, requires a detailed understanding of the growth characteristics of the network...
Christian Borgs, Jennifer T. Chayes, Constantinos ...
DEBS
2007
ACM
15 years 3 months ago
SpiderCast: a scalable interest-aware overlay for topic-based pub/sub communication
We introduce SpiderCast, a distributed protocol for constructing scalable churn-resistant overlay topologies for supporting decentralized topic-based pub/sub communication. Spider...
Gregory Chockler, Roie Melamed, Yoav Tock, Roman V...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 8 days ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
CCS
2005
ACM
15 years 5 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...