Sciweavers

214 search results - page 7 / 43
» Construction and Analysis of Web-Based Computer Science Info...
Sort
View
WWW
2008
ACM
14 years 8 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CIKM
1997
Springer
14 years 2 days ago
Learning Belief Networks from Data: An Information Theory Based Approach
This paper presents an efficient algorithm for learning Bayesian belief networks from databases. The algorithm takes a database as input and constructs the belief network structur...
Jie Cheng, David A. Bell, Weiru Liu
CIKM
2008
Springer
13 years 10 months ago
Mining social networks using heat diffusion processes for marketing candidates selection
Social Network Marketing techniques employ pre-existing social networks to increase brands or products awareness through word-of-mouth promotion. Full understanding of social netw...
Hao Ma, Haixuan Yang, Michael R. Lyu, Irwin King
PAMI
2011
12 years 10 months ago
Construction of Iso-Contours, Bisectors, and Voronoi Diagrams on Triangulated Surfaces
—In the research of computer vision and machine perception, three-dimensional objects are usually represented by 2-manifold triangular meshes M. In this paper, we present practic...
Yong-Jin Liu, Zhanqing Chen, Kai Tang
WWW
2007
ACM
14 years 8 months ago
EOS: expertise oriented search using social networks
In this paper, we present the design and implementation of our expertise oriented search (EOS) system. EOS is a researcher social network system. It has gathered information about...
Juan-Zi Li, Jie Tang, Jing Zhang, Qiong Luo, Yunha...