Sciweavers

5009 search results - page 253 / 1002
» Mapping Human Networks
Sort
View
CHI
2011
ACM
14 years 8 months ago
Guess who?: enriching the social graph through a crowdsourcing game
Despite the tremendous popularity of social network sites both on the web and within enterprises, the relationship information they contain may be often incomplete or outdated. We...
Ido Guy, Adam Perer, Tal Daniel, Ohad Greenshpan, ...
ICCAD
2006
IEEE
190views Hardware» more  ICCAD 2006»
16 years 2 months ago
Factor cuts
Enumeration of bounded size cuts is an important step in several logic synthesis algorithms such as technology mapping and re-writing. The standard algorithm does not scale beyond...
Satrajit Chatterjee, Alan Mishchenko, Robert K. Br...
CONEXT
2010
ACM
15 years 2 months ago
Declarative configuration management for complex and dynamic networks
Abstract-- Network management and operations are complicated, tedious, and error-prone, requiring significant human involvement and domain knowledge. As the complexity involved ine...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
WCNC
2008
IEEE
15 years 11 months ago
Integrated Source-Channel Decoding for Correlated Data-Gathering Sensor Networks
Abstract— This paper explores integrated source-channel decoding, driven by wireless sensor network applications where correlated information acquired by the network is gathered ...
Sheryl L. Howard, Paul G. Flikkema
ACSAC
2004
IEEE
15 years 9 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu