Sciweavers

551 search results - page 94 / 111
» Social spam detection
Sort
View
HUMAN
2003
Springer
14 years 2 months ago
A Study on Monitoring and Protecting Computer System against Interception Threat
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has no...
Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo C...
UM
2010
Springer
14 years 1 months ago
Twitter, Sensors and UI: Robust Context Modeling for Interruption Management
In this paper, we present the results of a two-month field study of fifteen people using a software tool designed to model changes in a user’s availability. The software uses s...
Justin Tang, Donald J. Patterson
AAIM
2007
Springer
118views Algorithms» more  AAIM 2007»
14 years 24 days ago
Significance-Driven Graph Clustering
Abstract. Modularity, the recently defined quality measure for clusterings, has attained instant popularity in the fields of social and natural sciences. We revisit the rationale b...
Marco Gaertler, Robert Görke, Dorothea Wagner
CASCON
2007
106views Education» more  CASCON 2007»
13 years 10 months ago
Identifying active subgroups in online communities
As online communities proliferate, methods are needed to explore and capture patterns of activity within them. This paper focuses on the problem of identifying active subgroups wi...
Alvin Chin, Mark H. Chignell
SDM
2004
SIAM
229views Data Mining» more  SDM 2004»
13 years 10 months ago
R-MAT: A Recursive Model for Graph Mining
How does a `normal' computer (or social) network look like? How can we spot `abnormal' sub-networks in the Internet, or web graph? The answer to such questions is vital ...
Deepayan Chakrabarti, Yiping Zhan, Christos Falout...