Sciweavers

694 search results - page 117 / 139
» Analysis of a Location-Based Social Network
Sort
View
DFN
2003
13 years 10 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
PAMI
2007
202views more  PAMI 2007»
13 years 8 months ago
Weighted Graph Cuts without Eigenvectors A Multilevel Approach
—A variety of clustering algorithms have recently been proposed to handle data that is not linearly separable; spectral clustering and kernel k-means are two of the main methods....
Inderjit S. Dhillon, Yuqiang Guan, Brian Kulis
MASS
2010
157views Communications» more  MASS 2010»
13 years 6 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 2 months ago
Core and Periphery in Free/Libre and Open Source Software Team Communications
The concept of the core group of developers is important and often discussed in empirical studies of FLOSS projects. This paper examines the question, “how does one empirically ...
Kevin Crowston, Kangning Wei, Qing Li, James Howis...
CRIWG
2004
13 years 10 months ago
An Integrated Approach for Analysing and Assessing the Performance of Virtual Learning Groups
Collaborative distance learning involves a variety of elements and factors that have to be considered and measured in order to analyse and assess group and individual performance m...
Thanasis Daradoumis, Alejandra Martínez-Mon...