Sciweavers

108 search results - page 9 / 22
» Identification and Evaluation of Weak Community Structures i...
Sort
View
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 9 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
ASUNAM
2009
IEEE
14 years 18 days ago
Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks
Community detection in social networks varying with time is a common yet challenging problem whereby efficient visualization of evolving relationships and implicit hierarchical s...
Romain Bourqui, Frédéric Gilbert, Pa...
DEBS
2010
ACM
13 years 2 months ago
Distributed structural and value XML filtering
Many XML filtering systems have emerged in recent years identifying XML data that structurally match XPath queries in an efficient way. However, apart from structural matching, it...
Iris Miliaraki, Manolis Koubarakis
CVPR
2012
IEEE
11 years 10 months ago
Sum-product networks for modeling activities with stochastic structure
This paper addresses recognition of human activities with stochastic structure, characterized by variable spacetime arrangements of primitive actions, and conducted by a variable ...
Mohamed R. Amer, Sinisa Todorovic
ICDM
2010
IEEE
202views Data Mining» more  ICDM 2010»
13 years 5 months ago
Discovering Overlapping Groups in Social Media
Abstract--The increasing popularity of social media is shortening the distance between people. Social activities, e.g., tagging in Flickr, bookmarking in Delicious, twittering in T...
Xufei Wang, Lei Tang, Huiji Gao, Huan Liu