Sciweavers

3910 search results - page 697 / 782
» Analyzing Cross-Connected Networks
Sort
View
SODA
2008
ACM
128views Algorithms» more  SODA 2008»
13 years 11 months ago
Analysis of greedy approximations with nonsubmodular potential functions
In this paper, we present two techniques to analyze greedy approximation with nonsubmodular functions restricted submodularity and shifted submodularity. As an application of the ...
Ding-Zhu Du, Ronald L. Graham, Panos M. Pardalos, ...
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
13 years 11 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei
AAAI
2006
13 years 11 months ago
Bookmark Hierarchies and Collaborative Recommendation
GiveALink.org is a social bookmarking site where users may donate and view their personal bookmark files online securely. The bookmarks are analyzed to build a new generation of i...
Benjamin Markines, Lubomira Stoilova, Filippo Menc...
ADCOG
2004
13 years 11 months ago
Social and Ethical Considerations in Virtual Worlds
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
Robert W. Kerbs
AVI
2006
13 years 11 months ago
Implicit brushing and target snapping: data exploration and sense-making on large displays
During grouping tasks for data exploration and sense-making, the criteria are normally not well-defined. When users are bringing together data objects thought to be similar in som...
Xiaohua Sun, Patrick Chiu, Jeffrey Huang, Maribeth...