Sciweavers

214 search results - page 29 / 43
» Construction and Analysis of Web-Based Computer Science Info...
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 9 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
CIKM
2010
Springer
13 years 6 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 9 months ago
ADANN: automatic design of artificial neural networks
In this work an improvement of an initial approach to design Artificial Neural Networks to forecast Time Series is tackled, and the automatic process to design Artificial Neural N...
Juan Peralta, Germán Gutiérrez, Arac...
WWW
2008
ACM
14 years 8 months ago
Yes, there is a correlation: - from social networks to personal behavior on the web
Characterizing the relationship that exists between a person's social group and his/her personal behavior has been a long standing goal of social network analysts. In this pa...
Parag Singla, Matthew Richardson