×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [nodes of]
Part II: Paper c: Skeletons, Roofs, and the Medial Axis Joseph ORourke Smith College
218 views
An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William
221 views
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R
216 views
Trust-Level Based Authentication Services in Mobile Ad Hoc Networks MPhil Term 2 Presentation (Spring 2003) by Edith Ngai Advisor: Prof. Michael R. Lyu
216 views
Recursive Graph Deduction and Reachability Queries Yangjun Chen Dept. Applied Computer Science, University of Winnipeg 515 Portage Ave. Winnipeg, Manitoba,
223 views
Edith C.H. Ngai and Michael R. Lyu
40 views
Fast and practical indexing and querying of very large graphs Silke Triβl, Ulf Leser Humboldt-Universitat zu Berlin Presenter: Liwen Sun (Stephen) SIGMOD’07
217 views