Sciweavers

301 search results - page 22 / 61
» Kronecker Graphs: An Approach to Modeling Networks
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 6 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
ICIP
2007
IEEE
14 years 10 months ago
Determining Topology in a Distributed Camera Network
Recently, `entry/exit' events of objects in the field-of-views of cameras were used to learn the topology of the camera network. The integration of object appearance was also...
Xiaotao Zou, Bir Bhanu, Bi Song, Amit K. Roy Chowd...
ICOIN
2007
Springer
14 years 2 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
BIB
2007
139views more  BIB 2007»
13 years 8 months ago
Petri net modelling of biological networks
Mathematical modelling is increasingly used to get insights into the functioning of complex biological networks. In this context, Petri nets (PNs) have recently emerged as a promi...
Claudine Chaouiya
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
11 years 11 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...