Sciweavers

274 search results - page 28 / 55
» Identifying sets of key players in a social network
Sort
View
WWW
2011
ACM
13 years 3 months ago
Pragmatic evaluation of folksonomies
Recently, a number of algorithms have been proposed to obtain hierarchical structures — so-called folksonomies — from social tagging data. Work on these algorithms is in part ...
Denis Helic, Markus Strohmaier, Christoph Trattner...
INTERACT
2003
13 years 9 months ago
Display-Based Activity in the Workplace
: We have developed simple taxonomy of visual display-based activity in office spaces using field data. Three key user values that displays provide are identified and investigated ...
Mark Perry, Kenton O'Hara
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 3 months ago
Combinatorial Network Optimization with Unknown Variables: Multi-Armed Bandits with Linear Rewards
In the classic multi-armed bandits problem, the goal is to have a policy for dynamically operating arms that each yield stochastic rewards with unknown means. The key metric of int...
Yi Gai, Bhaskar Krishnamachari, Rahul Jain
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
13 years 7 months ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...
WWW
2008
ACM
14 years 9 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang