Sciweavers

194 search results - page 19 / 39
» Reconstructing Randomized Social Networks
Sort
View
TMC
2012
11 years 10 months ago
Mobile Data Offloading through Opportunistic Communications and Social Participation
—3G networks are currently overloaded, due to the increasing popularity of various applications for smartphones. Offloading mobile data traffic through opportunistic communicatio...
Bo Han, Pan Hui, V. S. Anil Kumar, Madhav V. Marat...
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
14 years 2 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
JSW
2007
106views more  JSW 2007»
13 years 7 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
CORR
2006
Springer
107views Education» more  CORR 2006»
13 years 7 months ago
Dense Gaussian Sensor Networks: Minimum Achievable Distortion and the Order Optimality of Separation
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements...
Nan Liu, Sennur Ulukus
SIGCOMM
2010
ACM
13 years 7 months ago
Unbiased sampling in directed social graph
Microblogging services, such as Twitter, are among the most important online social networks(OSNs). Different from OSNs such as Facebook, the topology of microblogging service is ...
Tianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, B...