Sciweavers

1615 search results - page 128 / 323
» What's new
Sort
View
CMOT
2006
147views more  CMOT 2006»
13 years 9 months ago
Identifying sets of key players in a social network
A procedure is described for finding sets of key players in a social network. A key assumption is that the optimal selection of key players depends on what they are needed for. Acc...
Stephen P. Borgatti
ENTCS
2006
116views more  ENTCS 2006»
13 years 9 months ago
Stepwise Refinement of Processes
Industry is looking to create a market in reliable "plug-and-play" components. To model components in a modular style it would be useful to combine event-based and state...
Steve Reeves, David Streader
JANCL
2008
133views more  JANCL 2008»
13 years 9 months ago
Modal logic and invariance
Consider any logical system, what is its natural repertoire of logical operations? This question has been raised in particular for first-order logic and its extensions with genera...
Johan van Benthem, Denis Bonnay
DATAMINE
2007
97views more  DATAMINE 2007»
13 years 9 months ago
Mining for trigger events with survival analysis
This paper discusses a new application of data mining, quantifying the importance of responding to trigger events with reactive contacts. Trigger events happen during a customer’...
Edward C. Malthouse
JUCS
2006
135views more  JUCS 2006»
13 years 9 months ago
Visualization Services in a Conference Context: An Approach by RFID Technology
: Ambient Intelligent (AmI) vision is a new concept materialized by the Six Framework Program of the European Community. It involves three key technologies: Ubiquitous Computing, U...
José Bravo, Ramón Hervás, Ino...