Sciweavers

18697 search results - page 3692 / 3740
» Systemic Security Management
Sort
View
INEX
2009
Springer
15 years 8 months ago
Overview of the INEX 2009 Ad Hoc Track
This paper gives an overview of the INEX 2009 Ad Hoc Track. The main goals of the Ad Hoc Track were three-fold. The first goal was to investigate the impact of the collection scal...
Shlomo Geva, Jaap Kamps, Miro Lehtonen, Ralf Schen...
KDD
2009
ACM
379views Data Mining» more  KDD 2009»
15 years 8 months ago
MetaFac: community discovery via relational hypergraph factorization
This paper aims at discovering community structure in rich media social networks, through analysis of time-varying, multi-relational data. Community structure represents the laten...
Yu-Ru Lin, Jimeng Sun, Paul Castro, Ravi B. Konuru...
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
15 years 8 months ago
Parallel community detection on large networks with propinquity dynamics
Graphs or networks can be used to model complex systems. Detecting community structures from large network data is a classic and challenging task. In this paper, we propose a nove...
Yuzhou Zhang, Jianyong Wang, Yi Wang, Lizhu Zhou
CCO
2001
Springer
168views Combinatorics» more  CCO 2001»
15 years 8 months ago
Mathematical Programming Models and Formulations for Deterministic Production Planning Problems
Abstract. We study in this lecture the literature on mixed integer programming models and formulations for a specific problem class, namely deterministic production planning probl...
Yves Pochet
DEXA
2001
Springer
151views Database» more  DEXA 2001»
15 years 8 months ago
Cache Conscious Clustering C3
The two main techniques of improving I/O performance of Object Oriented Database Management Systems(OODBMS) are clustering and buffer replacement. Clustering is the placement of o...
Zhen He, Alonso Marquez
« Prev « First page 3692 / 3740 Last » Next »