Sciweavers

34181 search results - page 6478 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
130
Voted
EUSFLAT
2007
15 years 6 months ago
Using Generalized Constraints and Protoforms to Deal with Adverbs
Computation with information described in natural language (NL) has intrinsic importance because much of human knowledge is described using these languages. Soft Computing approac...
Andrés Soto, José Angel Olivas, Manu...
NSDI
2010
15 years 6 months ago
SplitScreen: Enabling Efficient, Distributed Malware Detection
We present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase...
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Tru...
NSDI
2010
15 years 6 months ago
Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks
Existing flooding algorithms have demonstrated their effectiveness in achieving communication efficiency and reliability in wireless sensor networks. However, further performance ...
Ting Zhu, Ziguo Zhong, Tian He, Zhi-Li Zhang
131
Voted
NSDI
2010
15 years 6 months ago
Hedera: Dynamic Flow Scheduling for Data Center Networks
Today's data centers offer tremendous aggregate bandwidth to clusters of tens of thousands of machines. However, because of limited port densities in even the highest-end swi...
Mohammad Al-Fares, Sivasankar Radhakrishnan, Barat...
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
15 years 6 months ago
Radius Plots for Mining Tera-byte Scale Graphs: Algorithms, Patterns, and Observations
Given large, multi-million node graphs (e.g., FaceBook, web-crawls, etc.), how do they evolve over time? How are they connected? What are the central nodes and the outliers of the...
U. Kang, Charalampos E. Tsourakakis, Ana Paula App...
« Prev « First page 6478 / 6837 Last » Next »