Sciweavers

1500 search results - page 176 / 300
» The Importance of Data Collection for Modelling Contact Netw...
Sort
View
142
Voted
WSDM
2012
ACM
254views Data Mining» more  WSDM 2012»
13 years 11 months ago
Maximizing product adoption in social networks
One of the key objectives of viral marketing is to identify a small set of users in a social network, who when convinced to adopt a product will influence others in the network l...
Smriti Bhagat, Amit Goyal 0002, Laks V. S. Lakshma...
248
Voted
PODS
2009
ACM
124views Database» more  PODS 2009»
16 years 4 months ago
Indexing uncertain data
Querying uncertain data has emerged as an important problem in data management due to the imprecise nature of many measurement data. In this paper we study answering range queries...
Pankaj K. Agarwal, Siu-Wing Cheng, Yufei Tao, Ke Y...
146
Voted
HICSS
2008
IEEE
126views Biometrics» more  HICSS 2008»
15 years 10 months ago
An Empirical Investigation of Knowledge Creation in Electronic Networks of Practice: Social Capital and Theory of Planned Behavi
How to achieve knowledge creation effectively remains a problem, this becomes even more difficult in a loosely knitted community such as networks of practice. This is because know...
Shih-Wei Chou, Yu-Chieh Chang
136
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
On the Routing Problem in Disconnected Vehicular Ad-hoc Networks
Abstract— Vehicular Ad Hoc Wireless Network (VANET) exhibits a bipolar behavior in terms of network topology: fully connected topology with high traffic volume or sparsely conne...
Nawaporn Wisitpongphan, Fan Bai, Priyantha Mudalig...
140
Voted
RAID
2004
Springer
15 years 9 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo