Sciweavers

7228 search results - page 1211 / 1446
» From Algorithmic to Subjective Randomness
Sort
View
166
Voted
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
15 years 11 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
MOBIHOC
2008
ACM
15 years 10 months ago
Fast and quality-guaranteed data streaming in resource-constrained sensor networks
In many emerging applications, data streams are monitored in a network environment. Due to limited communication bandwidth and other resource constraints, a critical and practical...
Emad Soroush, Kui Wu, Jian Pei
MOBIHOC
2003
ACM
15 years 10 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
WSDM
2010
ACM
1328views Data Mining» more  WSDM 2010»
15 years 8 months ago
TwitterRank: Finding Topic-sensitive Influential Twitterers
This paper focuses on the problem of identifying influential users of micro-blogging services. Twitter, one of the most notable micro-blogging services, employs a social-networkin...
Jianshu Weng, Ee-peng Lim, Jing Jiang, Qi He
WWW
2010
ACM
15 years 5 months ago
Relational duality: unsupervised extraction of semantic relations between entities on the web
Extracting semantic relations among entities is an important first step in various tasks in Web mining and natural language processing such as information extraction, relation de...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
« Prev « First page 1211 / 1446 Last » Next »