Sciweavers

800 search results - page 155 / 160
» Time Series Models for Internet Data Traffic
Sort
View
JMS
2010
139views more  JMS 2010»
13 years 6 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
WWW
2009
ACM
14 years 8 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
WWW
2006
ACM
14 years 8 months ago
Invisible participants: how cultural capital relates to lurking behavior
The asymmetry of activity in virtual communities is of great interest. While participation in the activities of virtual communities is crucial for a community's survival and ...
Vladimir Soroka, Sheizaf Rafaeli
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
13 years 11 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
CSREASAM
2003
13 years 9 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas