Sciweavers

2304 search results - page 78 / 461
» On the Vulnerability of Large Graphs
Sort
View
BIRTHDAY
2005
Springer
15 years 1 months ago
From Graph Transformation to Software Engineering and Back
Software engineers usually represent problems and solutions aph-based notations at different levels of abstractions. These notations are often semi-formal, but the use of graph tr...
Luciano Baresi, Mauro Pezzè
GRAPHICSINTERFACE
2009
14 years 9 months ago
Structural differences between two graphs through hierarchies
This paper presents a technique for visualizing the differences between two graphs. The technique assumes that a unique labeling of the nodes for each graph is available, where if...
Daniel Archambault
P2P
2007
IEEE
104views Communications» more  P2P 2007»
15 years 6 months ago
How stable are large superpeer networks against attack?
In this paper, we analyze the stability of large scale superpeer networks against attacks. Two different kinds of attacks namely deterministic and degree dependent attack have bee...
Bivas Mitra, Sujoy Ghose, Niloy Ganguly
WWW
2009
ACM
16 years 16 days ago
Smart Miner: a new framework for mining large scale web usage data
In this paper, we propose a novel framework called SmartMiner for web usage mining problem which uses link information for producing accurate user sessions and frequent navigation...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar...
WWW
2008
ACM
16 years 16 days ago
Statistical properties of community structure in large social and information networks
A large body of work has been devoted to identifying community structure in networks. A community is often though of as a set of nodes that has more connections between its member...
Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, Mi...