Sciweavers

165 search results - page 26 / 33
» Network Border Patrol
Sort
View
99
Voted
CSCW
2008
ACM
14 years 11 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
UIC
2007
Springer
15 years 3 months ago
Gateway Zone Multi-path Routing in Wireless Mesh Networks
Internet and multimedia services are widely-provided in All-IP based networks. There has been growing demand for mobile users to get those services. The Wireless Mesh Network (WMN...
Eric Hsiao-Kuang Wu, Wei-Li Chang, Chun-Wei Chen, ...
SIGCOMM
2003
ACM
15 years 2 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
JMLR
2008
100views more  JMLR 2008»
14 years 9 months ago
Hit Miss Networks with Applications to Instance Selection
In supervised learning, a training set consisting of labeled instances is used by a learning algorithm for generating a model (classifier) that is subsequently employed for decidi...
Elena Marchiori
CHI
2010
ACM
15 years 4 months ago
Blogging in a region of conflict: supporting transition to recovery
The blogosphere is changing how people experience war and conflict. We conducted an analysis of 125 blogs written by Iraqi citizens experiencing extreme disruption in their countr...
Ban Al-Ani, Gloria Mark, Bryan Semaan