Sciweavers

225 search results - page 36 / 45
» Individual resistance to IT innovations
Sort
View
BMCBI
2008
128views more  BMCBI 2008»
13 years 7 months ago
Validation of an NSP-based (negative selection pattern) gene family identification strategy
Background: Gene family identification from ESTs can be a valuable resource for analysis of genome evolution but presents unique challenges in organisms for which the entire genom...
Ronald L. Frank, Cyriac Kandoth, Fikret Erç...
ICDCS
2012
IEEE
11 years 10 months ago
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments
Abstract—In this paper we have proposed and designed FindingHuMo (Finding Human Motion), a real-time user tracking system for Smart Environments. FindingHuMo can perform device-f...
Debraj De, Wen-Zhan Song, Mingsen Xu, Cheng-Liang ...
WWW
2007
ACM
14 years 8 months ago
Information flow modeling based on diffusion rate for prediction and ranking
Information flows in a network where individuals influence each other. The diffusion rate captures how efficiently the information can diffuse among the users in the network. We p...
Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
14 years 8 months ago
Relational data pre-processing techniques for improved securities fraud detection
Commercial datasets are often large, relational, and dynamic. They contain many records of people, places, things, events and their interactions over time. Such datasets are rarel...
Andrew Fast, Lisa Friedland, Marc Maier, Brian Tay...
STOC
2007
ACM
140views Algorithms» more  STOC 2007»
14 years 8 months ago
On the submodularity of influence in social networks
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where...
Elchanan Mossel, Sébastien Roch