Sciweavers

2086 search results - page 239 / 418
» Mathematical Theory Exploration
Sort
View
118
Voted
DCC
2005
IEEE
16 years 3 months ago
Efficient Alphabet Partitioning Algorithms for Low-Complexity Entropy Coding
We analyze the technique for reducing the complexity of entropy coding consisting in the a priori grouping of the source alphabet symbols, and in dividing the coding process in tw...
Amir Said
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
16 years 25 days ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
104
Voted
WWW
2010
ACM
15 years 10 months ago
How much is your personal recommendation worth?
Suppose you buy a new laptop and, simply because you like it so much, you recommend it to friends, encouraging them to purchase it as well. What would be an adequate price for the...
Paul Dütting, Monika Henzinger, Ingmar Weber
SAC
2010
ACM
15 years 10 months ago
Estimating node similarity from co-citation in a spatial graph model
Co-citation (number of nodes linking to both of a given pair of nodes) is often used heuristically to judge similarity between nodes in a complex network. We investigate the relat...
Jeannette Janssen, Pawel Pralat, Rory Wilson
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
15 years 10 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi