Sciweavers

459 search results - page 59 / 92
» Detecting induced subgraphs
Sort
View
EUROPAR
1997
Springer
13 years 11 months ago
The Performance Potential of Value and Dependence Prediction
Abstract. The serialization constraints induced by the detection and enforcement of true data dependences have always been regarded as requirements for correct execution. We propos...
Mikko H. Lipasti, John Paul Shen
SOCINFO
2010
13 years 5 months ago
Social Manipulation of Online Recommender Systems
Abstract. Online recommender systems are a common target of attack. Existing research has focused on automated manipulation of recommender systems through the creation of shill acc...
Juan Lang, Matt Spear, Shyhtsun Felix Wu
VIZSEC
2004
Springer
14 years 23 days ago
Managing attack graph complexity through visual hierarchical aggregation
We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation coll...
Steven Noel, Sushil Jajodia
BMCBI
2005
253views more  BMCBI 2005»
13 years 7 months ago
The Use of Edge-Betweenness Clustering to Investigate Biological Function in Protein Interaction Networks
Background: This paper describes an automated method for finding clusters of interconnected proteins in protein interaction networks and retrieving protein annotations associated ...
Ruth Dunn, Frank Dudbridge, Christopher M. Sanders...
CIKM
2010
Springer
13 years 2 months ago
Mining networks with shared items
Recent advances in data processing have enabled the generation of large and complex graphs. Many researchers have developed techniques to investigate informative structures within...
Jun Sese, Mio Seki, Mutsumi Fukuzaki