Sciweavers

2347 search results - page 105 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
SSDBM
2010
IEEE
185views Database» more  SSDBM 2010»
14 years 8 months ago
DESSIN: Mining Dense Subgraph Patterns in a Single Graph
Currently, a large amount of data can be best represented as graphs, e.g., social networks, protein interaction networks, etc. The analysis of these networks is an urgent research ...
Shirong Li, Shijie Zhang, Jiong Yang
INFOCOM
2010
IEEE
14 years 7 months ago
Optimal Solutions for Single Fault Localization in Two Dimensional Lattice Networks
Abstract--Achieving fast, precise, and scalable fault localization has long been a highly desired feature in all-optical mesh networks. Monitoring tree (m-tree) is an interesting m...
János Tapolcai, Lajos Rónyai, Pin-Ha...
SIGSOFT
2010
ACM
14 years 7 months ago
Golden implementation driven software debugging
The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for soft...
Ansuman Banerjee, Abhik Roychoudhury, Johannes A. ...
BXML
2004
14 years 11 months ago
Binary Queries and XML Transformations
: We present a grammar-based approach to specifying k-ary queries for XML documents. k-ary queries simultaneously locate k nodes of an input tree as specified by a given relation. ...
Alexandru Berlea
GI
2009
Springer
14 years 7 months ago
Selling the Aether - A New Billing Schema for Mobile Advertising
: The ubiquity and personalization of mobile phones makes them a promising platform for advertising. Currently, practices known from online advertisement can be adapted, e.g. conte...
Matthias Böhmer, Gernot Bauer