Sciweavers

796 search results - page 156 / 160
» Graph Properties Based Filtering
Sort
View
122
Voted
MOBIHOC
2008
ACM
16 years 22 days ago
Using persistent homology to recover spatial information from encounter traces
In order to better understand human and animal mobility and its potential effects on Mobile Ad-Hoc networks and Delay-Tolerant Networks, many researchers have conducted experiment...
Brenton D. Walker
121
Voted
FPGA
2010
ACM
209views FPGA» more  FPGA 2010»
15 years 10 months ago
FPGA power reduction by guarded evaluation
Guarded evaluation is a power reduction technique that involves identifying sub-circuits (within a larger circuit) whose inputs can be held constant (guarded) at specific times d...
Chirag Ravishankar, Jason Helge Anderson
122
Voted
SIGCOMM
2006
ACM
15 years 7 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
143
Voted
IV
2003
IEEE
201views Visualization» more  IV 2003»
15 years 6 months ago
Layout Metrics for Euler Diagrams
An alternative term for these diagrams is “Euler-Venn diagrams” but they are often inaccurately called “Venn diagrams”. Venn diagrams often look similar, but must contain a...
Jean Flower, Peter Rodgers, Paul Mutton
111
Voted
STACS
1999
Springer
15 years 5 months ago
Costs of General Purpose Learning
Leo Harrington surprisingly constructed a machine which can learn any computable function f according to the following criterion (called Bc∗ -identification). His machine, on t...
John Case, Keh-Jiann Chen, Sanjay Jain