Sciweavers

1663 search results - page 326 / 333
» Computer Security in the Real World
Sort
View
JUCS
2010
160views more  JUCS 2010»
14 years 10 months ago
LCP-Nets: A Linguistic Approach for Non-functional Preferences in a Semantic SOA Environment
Abstract: This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-f...
Pierre Châtel, Isis Truck, Jacques Malenfant
PKDD
2010
Springer
235views Data Mining» more  PKDD 2010»
14 years 9 months ago
Online Structural Graph Clustering Using Frequent Subgraph Mining
The goal of graph clustering is to partition objects in a graph database into different clusters based on various criteria such as vertex connectivity, neighborhood similarity or t...
Madeleine Seeland, Tobias Girschick, Fabian Buchwa...
PKDD
2010
Springer
178views Data Mining» more  PKDD 2010»
14 years 9 months ago
Graph Regularized Transductive Classification on Heterogeneous Information Networks
A heterogeneous information network is a network composed of multiple types of objects and links. Recently, it has been recognized that strongly-typed heterogeneous information net...
Ming Ji, Yizhou Sun, Marina Danilevsky, Jiawei Han...
EUSFLAT
2009
156views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Interactive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference
One of the new trends in genetic fuzzy systems (GFS) is the use of evolutionary multiobjective optimization (EMO) algorithms. This is because EMO algorithms can easily handle two c...
Yusuke Nojima, Hisao Ishibuchi
WWW
2011
ACM
14 years 6 months ago
Mark my words!: linguistic style accommodation in social media
The psycholinguistic theory of communication accommodation accounts for the general observation that participants in conversations tend to converge to one another’s communicativ...
Cristian Danescu-Niculescu-Mizil, Michael Gamon, S...