Network analysis

Results: 5019



#Item
731Graph theory / Mathematics / Network theory / Algebraic graph theory / Network analysis / Networks / Clustering coefficient / Conductance / Degree distribution / Centrality / Modularity / Connectivity

./wiki-Talk-infAttackprecision-avg.eps

Add to Reading List

Source URL: www.epasto.org

Language: English - Date: 2015-07-21 16:42:47
732Graph theory / Mathematics / Discrete mathematics / Network theory / Networks / Network analysis / Edsger W. Dijkstra / Centrality / Small-world network / Shortest path problem / Graph / Breadth-first search

Orion: Shortest Path Estimation for Large Social Graphs Xiaohan Zhao, Alessandra Sala, Christo Wilson, Haitao Zheng and Ben Y. Zhao Department of Computer Science, UC Santa Barbara, USA {xiaohanzhao, alessandra, bowlin,

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2010-05-26 02:06:41
733Operations research / Engineering / Continuum mechanics / Aerodynamics / Piping / Optical flow / Image segmentation / Motion estimation / Motion field / Mathematical optimization / Flow network / Fluid dynamics

1744 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 34,

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Language: English - Date: 2012-08-14 14:38:37
734

Delaware Auditor of Accounts GASB Entity Determination Analysis Memo Delaware Health Information Network June 30, 2015 Not an FSF User

Add to Reading List

Source URL: www.auditor.delaware.gov

Language: English - Date: 2015-09-03 10:54:10
    735Metabolism / Systems biology / Biological databases / KEGG / Biochemistry / Metabolic pathway / Enzyme / Chemical reaction / Glycolysis / Biological pathway / Metabolic network modelling / Biochemical cascade

    366 Genome Informatics 14: 366–Analysis of Reactive Modules in the Metabolic Pathways Masaaki Kotera

    Add to Reading List

    Source URL: www.jsbi.org

    Language: English - Date: 2003-12-11 04:13:43
    736Computing / Internet privacy / Proxy / Statistical analysis / Computer security / Computer networking / Proxy servers / Computer network security / Proxy list

    Ares Faculty Guide: How to add a course proxy user If you have a teaching/graduate assistant, you can add them as a course proxy user to a specific course. Doing so grants them the privilege to add, edit and delete reser

    Add to Reading List

    Source URL: www.library.fordham.edu

    Language: English - Date: 2015-10-27 14:58:18
    737

    Network analysis of reverse phase protein expression data: Characterizing protein signatures in acute myeloid leukemia cytogenetic categories t(8;21) and inv(16)

    Add to Reading List

    Source URL: www.qutublab.rice.edu

    Language: English - Date: 2012-12-04 10:46:13
      738

      Longitudinal Dynamic Network Analysis Using the Over Time Viewer Feature in ORA Ian McCulloh & Kathleen Carley March 9, 2009 CMU-ISR

      Add to Reading List

      Source URL: reports-archive.adm.cs.cmu.edu

      Language: English - Date: 2010-07-20 17:33:48
        739Computing / Network performance / Scheduling algorithms / Computer networking / Computer network security / Denial-of-service attacks / Robust random early detection / Network scheduler / Fair queuing / Scheduling / Transmission Control Protocol / Schedule

        Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia

        Add to Reading List

        Source URL: info.iet.unipi.it

        Language: English - Date: 2012-05-25 16:00:35
        740

        Delaware Auditor of Accounts GASB Entity Determination Analysis Memo Delaware Health Information Network June 30, 2015 Not an FSF User

        Add to Reading List

        Source URL: auditor.delaware.gov

        Language: English - Date: 2015-09-03 10:54:10
          UPDATE