Sciweavers

5606 search results - page 212 / 1122
» Randomization Techniques for Graphs.
Sort
View
ASPDAC
2008
ACM
74views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Large-scale fixed-outline floorplanning design using convex optimization techniques
A two-stage optimization methodology is proposed to solve the fixed-outline floorplanning problem that is a global optimization problem for wirelength minimization. In the first st...
Chaomin Luo, Miguel F. Anjos, Anthony Vannelli
121
Voted
SAMOS
2010
Springer
15 years 2 months ago
Programming multi-core architectures using Data-Flow techniques
Abstract—In this paper we present a Multithreaded programming methodology for multi-core systems that utilizes DataFlow concurrency. The programmer augments the program with macr...
Samer Arandi, Paraskevas Evripidou
151
Voted
CSREASAM
2006
15 years 5 months ago
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System
- Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statist...
Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexi...
141
Voted
CCS
2010
ACM
15 years 2 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
137
Voted
WINE
2009
Springer
383views Economy» more  WINE 2009»
15 years 10 months ago
News Posting by Strategic Users in a Social Network
We argue that users in social networks are strategic in how they post and propagate information. We propose two models — greedy and courteous — and study information propagatio...
Mangesh Gupte, MohammadTaghi Hajiaghayi, Lu Han, L...