Sciweavers

2540 search results - page 365 / 508
» Social Networks: An Introduction
Sort
View
ICCS
2009
Springer
15 years 4 months ago
Simulating Individual-Based Models of Epidemics in Hierarchical Networks
Current mathematical modeling methods for the spreading of infectious diseases are too simplified and do not scale well. We present the Simulator of Epidemic Evolution in Complex ...
Rick Quax, David A. Bader, Peter M. A. Sloot
75
Voted
HT
2009
ACM
15 years 4 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
ICDCS
2008
IEEE
15 years 4 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICDM
2008
IEEE
127views Data Mining» more  ICDM 2008»
15 years 4 months ago
The Impact of Structural Changes on Predictions of Diffusion in Networks
In a typical realistic scenario, there exist some past data about the structure of the network which are analyzed with respect to some possibly future spreading process, such as b...
Mayank Lahiri, Arun S. Maiya, Rajmonda Sulo, Habib...
WSC
2008
15 years 14 days ago
Incorporating information networks into military simulations
Information superiority is considered a critical capability for future joint forces. As advances in technology continue to boost our ability to communicate in new and different wa...
Darryl K. Ahner, Jonathon K. Alt, Francisco Baez, ...