Sciweavers

1846 search results - page 340 / 370
» Geographically-Sensitive Link Analysis
Sort
View
WSDM
2010
ACM
1328views Data Mining» more  WSDM 2010»
15 years 11 months ago
TwitterRank: Finding Topic-sensitive Influential Twitterers
This paper focuses on the problem of identifying influential users of micro-blogging services. Twitter, one of the most notable micro-blogging services, employs a social-networkin...
Jianshu Weng, Ee-peng Lim, Jing Jiang, Qi He
PPOPP
2010
ACM
15 years 10 months ago
A distributed placement service for graph-structured and tree-structured data
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
Gregory Buehrer, Srinivasan Parthasarathy, Shirish...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 8 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
WISEC
2009
ACM
15 years 8 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
IPSN
2009
Springer
15 years 8 months ago
Anti-jamming for embedded wireless networks
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and ...
Miroslav Pajic, Rahul Mangharam