Sciweavers

14 search results - page 2 / 3
» Extracting and Utilizing Social Networks from Log Files of S...
Sort
View
ISI
2008
Springer
13 years 5 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 5 months ago
Predicting the Future with Social Media
In recent years, social media has become ubiquitous and important for social networking and content sharing. And yet, the content that is generated from these websites remains larg...
Sitaram Asur, Bernardo A. Huberman
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
13 years 9 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
FGCS
2008
102views more  FGCS 2008»
13 years 5 months ago
Making the best of a bad situation: Prioritized storage management in GEMS
As distributed storage systems grow, the response time between detection and repair of the error becomes significant. Systems built on shared servers have additional complexity be...
Justin M. Wozniak, Paul Brenner, Douglas Thain, Aa...
SEMWEB
2007
Springer
13 years 11 months ago
ArnetMiner: An Expertise Oriented Search System for Web Community
Expertise Oriented Search aims at providing comprehensive analysis and mining for people from distributed sources. In this paper, we give an overview of the expertise oriented sear...
Jie Tang, Jing Zhang, Duo Zhang, Limin Yao, Chunli...