Sciweavers

25111 search results - page 4858 / 5023
» Information Systems
Sort
View
ICWSM
2009
14 years 9 months ago
Gesundheit! Modeling Contagion through Facebook News Feed
Whether they are modeling bookmarking behavior in Flickr or cascades of failure in large networks, models of diffusion often start with the assumption that a few nodes start long ...
Eric Sun, Itamar Rosenn, Cameron Marlow, Thomas M....
ICSE
2011
IEEE-ACM
14 years 3 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
MOBISYS
2011
ACM
14 years 2 months ago
Indoor localization without infrastructure using the acoustic background spectrum
We introduce a new technique for determining a mobile phone’s indoor location even when Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient so...
Stephen P. Tarzia, Peter A. Dinda, Robert P. Dick,...
KDD
2001
ACM
359views Data Mining» more  KDD 2001»
16 years 9 days ago
Data mining techniques to improve forecast accuracy in airline business
Predictive models developed by applying Data Mining techniques are used to improve forecasting accuracy in the airline business. In order to maximize the revenue on a flight, the ...
Christoph Hueglin, Francesco Vannotti
ISCC
2007
IEEE
136views Communications» more  ISCC 2007»
15 years 6 months ago
Analysis of the IPv4 Address Space Delegation Structure
The Internet has grown tremendously in terms of the number of users who rely on it and the number of organizations that are connected to it. Characterizing how this growth affects...
Anusha Sriraman, Kevin R. B. Butler, Patrick Drew ...
« Prev « First page 4858 / 5023 Last » Next »