Sciweavers

108 search results - page 17 / 22
» Homeland Security Data Mining Using Social Network Analysis
Sort
View
RECSYS
2010
ACM
13 years 7 months ago
Affiliation recommendation using auxiliary networks
Social network analysis has attracted increasing attention in recent years. In many social networks, besides friendship links amongst users, the phenomenon of users associating th...
Vishvas Vasuki, Nagarajan Natarajan, Zhengdong Lu,...
HICSS
2000
IEEE
160views Biometrics» more  HICSS 2000»
13 years 12 months ago
Analysis of Coordinated Multilateral Trades
A new operating paradigm is still needed for the power industry in order to achieve a workable deregulated market. The two main proposals, namely the Bilateral and the Poolco mode...
Pierre-François D. Quet, Jose B. Cruz Jr., ...
KDD
2005
ACM
162views Data Mining» more  KDD 2005»
14 years 8 months ago
Discovering frequent topological structures from graph datasets
The problem of finding frequent patterns from graph-based datasets is an important one that finds applications in drug discovery, protein structure analysis, XML querying, and soc...
Ruoming Jin, Chao Wang, Dmitrii Polshakov, Sriniva...
SDM
2009
SIAM
192views Data Mining» more  SDM 2009»
14 years 4 months ago
Mining Cohesive Patterns from Graphs with Feature Vectors.
The increasing availability of network data is creating a great potential for knowledge discovery from graph data. In many applications, feature vectors are given in addition to g...
Arash Rafiey, Flavia Moser, Martin Ester, Recep Co...
ICSE
2009
IEEE-ACM
14 years 8 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...