Sciweavers

555 search results - page 47 / 111
» Performance Evaluation of Two Data Mining Techniques of Netw...
Sort
View
ISI
2006
Springer
13 years 7 months ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
CIKM
2008
Springer
13 years 9 months ago
Representative entry selection for profiling blogs
Many applications on blog search and mining often meet the challenge of handling huge volume of blog data, in which one single blog could contain hundreds or even thousands of ent...
Jinfeng Zhuang, Steven C. H. Hoi, Aixin Sun, Rong ...
PERCOM
2009
ACM
14 years 2 months ago
Using Situation Lattices in Sensor Analysis
Highly sensorised systems present two parallel challenges: how to design a sensor suite that can efficiently and cost-effectively support the needs of given services; and to extr...
Juan Ye, Lorcan Coyle, Simon Dobson, Paddy Nixon
GFKL
2007
Springer
196views Data Mining» more  GFKL 2007»
14 years 1 months ago
Comparison of Recommender System Algorithms Focusing on the New-item and User-bias Problem
Recommender systems are used by an increasing number of e-commerce websites to help the customers to find suitable products from a large database. One of the most popular techniqu...
Stefan Hauger, Karen H. L. Tso, Lars Schmidt-Thiem...
ITC
1997
IEEE
73views Hardware» more  ITC 1997»
13 years 12 months ago
A Low-Overhead Design for Testability and Test Generation Technique for Core-Based Systems
In a fundamental paradigm shift in system design, entire systems are being built on a single chip, using multiple embedded cores. Though the newest system design methodology has s...
Indradeep Ghosh, Niraj K. Jha, Sujit Dey