Sciweavers

7544 search results - page 97 / 1509
» Network Forensics Analysis
Sort
View
347
Voted
CNSR
2011
IEEE
320views Communications» more  CNSR 2011»
14 years 6 months ago
A Structural Analysis of Network Delay
—Network delay is a crucial metric for evaluating the state of the network. We present in this paper a structural analysis of network delay, based on delay measurements of a back...
Atef Abdelkefi, Yuming Jiang
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 5 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 5 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...
CJ
2010
100views more  CJ 2010»
15 years 20 days ago
Social Networks: An Introduction
Mark Levene
TCBB
2008
101views more  TCBB 2008»
15 years 3 months ago
Improved Layout of Phylogenetic Networks
Split networks are increasingly being used in phylogenetic analysis. Usually, a simple equal-angle algorithm is used to draw such networks, producing layouts that leave much room f...
Philippe Gambette, Daniel H. Huson