Sciweavers

300 search results - page 38 / 60
» Sampling Representative Users from Large Social Networks
Sort
View
WSDM
2012
ACM
290views Data Mining» more  WSDM 2012»
12 years 3 months ago
Online selection of diverse results
The phenomenal growth in the volume of easily accessible information via various web-based services has made it essential for service providers to provide users with personalized ...
Debmalya Panigrahi, Atish Das Sarma, Gagan Aggarwa...
IMC
2005
ACM
14 years 1 months ago
The Power of Slicing in Internet Flow Measurement
Flow measurement evolved into the primary method for measuring the composition of Internet traffic. Large ISPs and small networks use it to track dominant applications, dominant ...
Ramana Rao Kompella, Cristian Estan
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 3 days ago
A viewpoint-based approach for interaction graph analysis
Recent innovations have resulted in a plethora of social applications on the Web, such as blogs, social networks, and community photo and video sharing applications. Such applicat...
Sitaram Asur, Srinivasan Parthasarathy
DSN
2003
IEEE
14 years 25 days ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
COMAD
2009
13 years 8 months ago
Trust-Based Infinitesimals for Enhanced Collaborative Filtering
In this paper we propose a novel recommender system which enhances user-based collaborative filtering by using a trust-based social network. Our main idea is to use infinitesimal ...
Maria Chowdhury, Alex Thomo, William W. Wadge