Sciweavers

421 search results - page 48 / 85
» Game-Theoretic Models of Information Overload in Social Netw...
Sort
View
CSE
2009
IEEE
14 years 2 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
IPPS
2006
IEEE
14 years 1 months ago
Towards a universal client for grid monitoring systems: design and implementation of the Ovid browser
In this paper, we present the design and implementation of Ovid, a browser for Grid-related information. The key goal of Ovid is to support the seamless navigation of users in the...
Marios D. Dikaiakos, A. Artemiou, George Tsouloupa...
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
HT
2010
ACM
13 years 9 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
ICDM
2007
IEEE
124views Data Mining» more  ICDM 2007»
14 years 2 months ago
Local Probabilistic Models for Link Prediction
One of the core tasks in social network analysis is to predict the formation of links (i.e. various types of relationships) over time. Previous research has generally represented ...
Chao Wang, Venu Satuluri, Srinivasan Parthasarathy