Sciweavers

89 search results - page 9 / 18
» Randomizing Social Networks: a Spectrum Preserving Approach
Sort
View
WONS
2012
IEEE
13 years 5 months ago
Obfuscating IEEE 802.15.4 communication using secret spreading codes
—The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading ...
Bjorn Muntwyler, Vincent Lenders, Franck Legendre,...
PVLDB
2010
116views more  PVLDB 2010»
14 years 4 months ago
Schism: a Workload-Driven Approach to Database Replication and Partitioning
We present Schism, a novel workload-aware approach for database partitioning and replication designed to improve scalability of sharednothing distributed databases. Because distri...
Carlo Curino, Yang Zhang, Evan P. C. Jones, Samuel...
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
15 years 3 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao
INFOCOM
2012
IEEE
13 years 1 days ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
CDC
2010
IEEE
123views Control Systems» more  CDC 2010»
14 years 4 months ago
Implicit learning for explicit discount targeting in Online Social networks
Online Social networks are increasingly being seen as a means of obtaining awareness of user preferences. Such awareness could be used to target goods and services at them. We cons...
Srinivas Shakkottai, Lei Ying, Sankalp Sah