Sciweavers

2540 search results - page 302 / 508
» Social Networks: An Introduction
Sort
View
65
Voted
IJNVO
2011
47views more  IJNVO 2011»
14 years 8 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
INFOCOM
2011
IEEE
14 years 5 months ago
User-centric data dissemination in disruption tolerant networks
Abstract—Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user...
Wei Gao, Guohong Cao
118
Voted
ESWS
2006
Springer
15 years 5 months ago
Semantic Network Analysis of Ontologies
A key argument for modeling knowledge in ontologies is the easy re-use and re-engineering of the knowledge. However, beside consistency checking, current ontology engineering tools...
Bettina Hoser, Andreas Hotho, Robert Jäschke,...
HUMAN
2003
Springer
15 years 7 months ago
A Graph-Based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
Multipath on-demand routing protocols for mobile ad hoc networks try to reduce control overhead and end-to-end delay by computing multiple paths with a single route discovery proce...
Gunyoung Koh, Duyoung Oh, Heekyoung Woo
76
Voted
SIGMOBILE
2008
86views more  SIGMOBILE 2008»
15 years 1 months ago
Profile-cast: behavior-aware mobile networking
In this paper we advocate a service paradigm, profile-cast, within the communication framework of delay tolerant networks (DTN)[2]. This novel approach leverages the behavioral pat...
Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy