Sciweavers

2143 search results - page 350 / 429
» corr 2010
Sort
View
95
Voted
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 23 days ago
Random Topologies and the emergence of cooperation: the role of short-cuts
We present a detailed study about the role of the short-cuts of a network in promoting the emergence of cooperation in a population of agents playing the Prisoner's Dilemma Ga...
Daniele Vilone, Angel Sánchez, Jesús...
CORR
2010
Springer
268views Education» more  CORR 2010»
15 years 23 days ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
115
Voted
CORR
2010
Springer
147views Education» more  CORR 2010»
15 years 23 days ago
Modeling the structure and evolution of discussion cascades
We analyze the structure and evolution of discussion cascades in four popular websites: Slashdot, Barrapunto, Meneame and Wikipedia. Despite the big heterogeneities between these ...
Vicenç Gómez, Hilbert J. Kappen, And...
42
Voted
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 23 days ago
ML(n)BiCGStab: Reformulation, Analysis and Implementation
With the help of index functions, we re-derive the ML(n)BiCGStab algorithm in [35] in a more systematic way. There are n ways to define the ML(n)BiCGStab residual vector. Each diff...
Man-Chung Yeung
CORR
2010
Springer
95views Education» more  CORR 2010»
15 years 7 days ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...