Sciweavers

1846 search results - page 340 / 370
» Geographically-Sensitive Link Analysis
Sort
View
167
Voted
WSDM
2010
ACM
1328views Data Mining» more  WSDM 2010»
16 years 1 months ago
TwitterRank: Finding Topic-sensitive Influential Twitterers
This paper focuses on the problem of identifying influential users of micro-blogging services. Twitter, one of the most notable micro-blogging services, employs a social-networkin...
Jianshu Weng, Ee-peng Lim, Jing Jiang, Qi He
195
Voted
PPOPP
2010
ACM
16 years 29 days ago
A distributed placement service for graph-structured and tree-structured data
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
Gregory Buehrer, Srinivasan Parthasarathy, Shirish...
136
Voted
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 10 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
154
Voted
WISEC
2009
ACM
15 years 10 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
119
Voted
IPSN
2009
Springer
15 years 10 months ago
Anti-jamming for embedded wireless networks
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and ...
Miroslav Pajic, Rahul Mangharam