Sciweavers

606 search results - page 101 / 122
» Memory-constrained aggregate computation over data streams
Sort
View
87
Voted
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
14 years 11 months ago
Patterns of Cascading Behavior in Large Blog Graphs
How do blogs cite and influence each other? How do such links evolve? Does the popularity of old blog posts drop exponentially with time? These are some of the questions that we ...
Jure Leskovec, Mary McGlohon, Christos Faloutsos, ...
SAC
2005
ACM
15 years 3 months ago
Dynamic group communication in mobile peer-to-peer environments
This paper presents an approach to integrate publish/subscribe semantics with on-demand multicast in wireless ad hoc networks, providing dynamic group communication with fine-gra...
Eiko Yoneki, Jean Bacon
ACMSE
2006
ACM
15 years 3 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
108
Voted
SAC
2010
ACM
15 years 4 months ago
On processing location based top-k queries in the wireless broadcasting system
In this paper, we explore the problem of processing a novel type of location based queries, named the location based top-k query, which involves both of spatial and non-spatial sp...
HaRim Jung, Byung Ku Cho, Yon Dohn Chung, Ling Liu
VIS
2007
IEEE
149views Visualization» more  VIS 2007»
15 years 10 months ago
Time Dependent Processing in a Parallel Pipeline Architecture
Pipeline architectures provide a versatile and efficient mechanism for constructing visualizations, and they have been implemented in numerous libraries and applications over the p...
John Biddiscombe, Berk Geveci, Ken Martin, Kenn...