Sciweavers

13180 search results - page 2397 / 2636
» Network Models
Sort
View
EDBT
2012
ACM
228views Database» more  EDBT 2012»
13 years 6 months ago
Finding maximal k-edge-connected subgraphs from a large graph
In this paper, we study how to find maximal k-edge-connected subgraphs from a large graph. k-edge-connected subgraphs can be used to capture closely related vertices, and findin...
Rui Zhou, Chengfei Liu, Jeffrey Xu Yu, Weifa Liang...
161
Voted
IDTRUST
2009
ACM
15 years 10 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
CDC
2008
IEEE
116views Control Systems» more  CDC 2008»
15 years 10 months ago
Effective sensing regions and connectivity of agents undergoing periodic relative motions
— Time-varying graphs are widely used to model communication and sensing in multi-agent systems such as mobile sensor networks and dynamic animal groups. Connectivity is often de...
Daniel T. Swain, Ming Cao, Naomi Ehrich Leonard
154
Voted
ICC
2007
IEEE
158views Communications» more  ICC 2007»
15 years 10 months ago
Cooperative Game Theory for Distributed Spectrum Sharing
— There is a need for new spectrum access protocols that are opportunistic, flexible and efficient, yet fair. Game theory provides a framework for analyzing spectrum access, a ...
Juan E. Suris, Luiz A. DaSilva, Zhu Han, Allen B. ...
148
Voted
IEAAIE
2007
Springer
15 years 10 months ago
Generating Cartoon-Style Summary of Daily Life with Multimedia Mobile Devices
Mobile devices are treasure boxes of personal information containing user’s context, personal schedule, diary, short messages, photos, and videos. Also, user’s usage informatio...
Sung-Bae Cho, Kyung-Joong Kim, Keum-Sung Hwang
« Prev « First page 2397 / 2636 Last » Next »