Sciweavers

773 search results - page 153 / 155
» A Computational Model of Social Perlocutions
Sort
View
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
13 years 8 months ago
Less is More: Compact Matrix Decomposition for Large Sparse Graphs
Given a large sparse graph, how can we find patterns and anomalies? Several important applications can be modeled as large sparse graphs, e.g., network traffic monitoring, resea...
Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Falo...
ACMICEC
2007
ACM
220views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Asymptotically optimal repeated auctions for sponsored search
We investigate asymptotically optimal keyword auctions, that is, auctions which maximize revenue as the number of bidders grows. We do so under two alternative behavioral assumpti...
Nicolas S. Lambert, Yoav Shoham
ATAL
2004
Springer
13 years 11 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
CIVR
2008
Springer
239views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Analyzing Flickr groups
There is an explosion of community-generated multimedia content available online. In particular, Flickr constitutes a 200-million photo sharing system where users participate foll...
Radu Andrei Negoescu, Daniel Gatica-Perez
SDM
2010
SIAM
204views Data Mining» more  SDM 2010»
13 years 8 months ago
Scalable Tensor Factorizations with Missing Data
The problem of missing data is ubiquitous in domains such as biomedical signal processing, network traffic analysis, bibliometrics, social network analysis, chemometrics, computer...
Evrim Acar, Daniel M. Dunlavy, Tamara G. Kolda, Mo...