Sciweavers

1082 search results - page 43 / 217
» Graph Mining using Graph Pattern Profiles
Sort
View
115
Voted
CIDM
2009
IEEE
15 years 9 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
96
Voted
WINET
2010
95views more  WINET 2010»
14 years 9 months ago
Performance evaluation of routing protocols for MANETs with known connectivity patterns using evolving graphs
Afonso Ferreira, Alfredo Goldman, Julian Monteiro
132
Voted
ICPR
2006
IEEE
16 years 3 months ago
A Convolution Edit Kernel for Error-tolerant Graph Matching
General graph matching methods often suffer from the lack of mathematical structure in the space of graphs. Using kernel functions to evaluate structural graph similarity allows u...
Horst Bunke, Michel Neuhaus
175
Voted
PPOPP
2010
ACM
15 years 11 months ago
A distributed placement service for graph-structured and tree-structured data
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
Gregory Buehrer, Srinivasan Parthasarathy, Shirish...
CIE
2010
Springer
15 years 7 months ago
Spatial Models for Virtual Networks
This paper discusses the use of spatial graph models for the analysis of networks that do not have a direct spatial reality, such as web graphs, on-line social networks, or citatio...
Jeannette Janssen