Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Nodes-Consensus'
Nodes-Consensus published presentations and documents on DocSlides.
Scalable Mining of Massive Networks: Distance-based
by test
Centrality. , Similarity, and . Influence. Edith ...
Compressing
by myesha-ticknor
Backoff. in CSMA Networks. Mahanth Gowda. Univer...
Gastrointestinal Cancers
by karlyn-bohler
1. Pancreatic Cancer. 2. Breast Cancer. New diagn...
Usurp:
by faustina-dinatale
Distributed NAT Traversal for . Overlay Networks....
Dynamic Trust Management for Delay Tolerant Networks and It
by tatiana-dople
1. Abstract. 2. In this paper, the authors design...
Towards Anonymous Communication Infrastructure
by calandra-battersby
There are many existing anonymous communication s...
A Gentle Introduction to Social Network Analysis
by min-jolicoeur
From a Sociologist’s Perspective. Reuben (Jack)...
Exploiting System Diversity in
by pamella-moone
Peer-to-Peer Publish-Subscribe Systems. Final Exa...
CMPT 401
by pasty-toler
2008. Dr. Alexandra Fedorova. Lecture XV: Real P2...
On Detection and Concealment of Critical Roles in Tactical
by cheryl-pisano
Zhuo. Lu. University of Memphis. Cliff Wang. Arm...
Centralities
by myesha-ticknor
(Gephi and Python). By: Ralucca Gera, NPS. Exce...
Route Planning
by giovanna-bartolotta
Tabulation. Dijkstra. . Bidirectional. A*. Landm...
Life after CAP
by sherrill-nordquist
Ali Ghodsi. alig@cs.berkeley.edu. CAP conjecture ...
9. Software for network visualisation and analysis
by pasty-toler
Criteria. Free. User friendly manual. On-screen n...
1 Search Problems
by faustina-dinatale
CSD 15-780: Graduate Artificial Intelligence. Ins...
How to Schedule a Cascade in an Arbitrary Graph
by cheryl-pisano
F. . Chierchetti. , J. Kleinberg, A. . Panconesi....
Fault Tolerance
by min-jolicoeur
in . Wireless Sensor Networks. Balaaji Tirouvenga...
Understanding Trees
by ellena-manuel
Pre-test. Which mammal is the pig more closely re...
Cost Effective and Survivable Cabling Design under Major Di
by tatiana-dople
大災難. 下具有成本效益和生存能力...
On the Lifetime of Wireless Sensor Networks
by kittie-lecroy
Isabel Dietrich. Falko. Dressler. ACM Transactio...
1 Improved DNS Server Selection for Multi-Homed Nodes
by kittie-lecroy
. draft-savolainen-mif-dns-server-selection-04. ...
All-Distances Sketches, Revisited:
by briana-ranney
HIP . Estimators for. Massive . Graphs Analysis. ...
Computing Classic Closeness Centrality, at Scale
by calandra-battersby
Edith Cohen. Joint with: . Thomas . Pajor. , . Da...
For Monday
by marina-yarberry
Read chapter 18, sections 1-2. Homework:. Chapter...
Looked at some research approaches to:
by briana-ranney
Evaluate . defense. effectiveness. Stop worm fro...
1 k-anonymity in Graphs
by giovanna-bartolotta
2. Methods based on k-anonymity. k-candidate. k...
Cooking Recipe Visualizers
by luanne-stotts
Chaitanya Kulkarni, Grader CSE5544. The Problem S...
Buying into “Summit” under the “Condo” model
by giovanna-bartolotta
Pat Burns, VP for IT. Rick Casey, HPC Manager. H....
Hadoop-Harp Applications Performance Analysis
by stefany-barnette
on Big Red II. Notes. For K-Means Clustering and ...
Lymphadenopathy
by test
Presented by : . Bhajneesh. Singh . Bedi. Object...
CRIM6660 Terrorist Networks
by pamella-moone
Lesson 1: Introduction, Terms and Definitions. Co...
Varicose
by calandra-battersby
Veins. Vascular . Tumors. Varicose veins:. Dilate...
CSCI-1680 - Computer Networks
by lindy-dunigan
John . Jannotti. (. jj. ). http://www.cs.brown.e...
Chrono::FEA
by tatiana-dople
API. 1. Chrono::FEA. Chrono::FEA is a C++ module ...
Cooking Recipe Visualizers
by natalia-silvester
Chaitanya Kulkarni, Grader CSE5544. The Problem S...
On the Connectivity of Multi-layered
by pasty-toler
Networks:. . Models. , Measures and Optimal . Co...
RNetica
by cheryl-pisano
Quick Start . G. uide. Downloading. http://pluto....
GROSS ANATOMY OF THE BREAST
by alexa-scheidler
BY . DR ANYANWU GE. INTRODUCTION . The breast is ...
Network Science
by marina-yarberry
Class 5: BA . model. Albert-. László. . Barab...
An Efficient Distributed Trust Model for Wireless Sensor Ne
by debby-jeon
J. Jiang, G. Han, F. . Weng. , L. Shu, M. . Guiza...
Load More...