Sciweavers

7544 search results - page 137 / 1509
» Network Forensics Analysis
Sort
View
CSCW
2004
ACM
15 years 8 months ago
Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research
In this paper, we describe the evolution and impact of computersupported cooperative work (CSCW) research through social network analysis of coauthorship data. A network of author...
Daniel B. Horn, Thomas A. Finholt, Jeremy P. Birnh...
121
Voted
KDD
2009
ACM
164views Data Mining» more  KDD 2009»
16 years 4 months ago
Social influence analysis in large-scale networks
In large social networks, nodes (users, entities) are influenced by others for various reasons. For example, the colleagues have strong influence on one's work, while the fri...
Jie Tang, Jimeng Sun, Chi Wang, Zi Yang
RTAS
2003
IEEE
15 years 8 months ago
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network
This paper presents a novel approach for calculating a probabilistic worst-case response-time for messages in the Controller Area Network (CAN). CAN uses a bit-stuffing mechanism...
Thomas Nolte, Hans Hansson, Christer Norström
126
Voted
COMSWARE
2008
IEEE
15 years 10 months ago
Experimental analysis of RSSI-based location estimation in wireless sensor networks
—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Mohit Saxena, Puneet Gupta, Bijendra N. Jain
NOCS
2008
IEEE
15 years 9 months ago
Real-Time Communication Analysis for On-Chip Networks with Wormhole Switching
Abstract— In this paper, we discuss a real-time on-chip communication service with a priority-based wormhole switching policy. A novel off-line schedulability analysis approach i...
Zheng Shi, Alan Burns