Sciweavers

5970 search results - page 1112 / 1194
» Management Information Model Engineering
Sort
View
142
Voted
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
15 years 2 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...
174
Voted
CSCW
2011
ACM
14 years 10 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
149
Voted
CVPR
2004
IEEE
16 years 5 months ago
Fast, Integrated Person Tracking and Activity Recognition with Plan-View Templates from a Single Stereo Camera
Copyright 2004 IEEE. Published in Conference on Computer Vision and Pattern Recognition (CVPR-2004), June 27 - July 2, 2004, Washington DC. Personal use of this material is permit...
Michael Harville, Dalong Li
SAC
2009
ACM
15 years 10 months ago
Applying latent dirichlet allocation to group discovery in large graphs
This paper introduces LDA-G, a scalable Bayesian approach to finding latent group structures in large real-world graph data. Existing Bayesian approaches for group discovery (suc...
Keith Henderson, Tina Eliassi-Rad
119
Voted
ICIS
2004
15 years 5 months ago
Are Digital Rights Valuable? Theory and Evidence from the eBook Industry
The effective management of digital rights is a crucial challenge in many industries making the transition from physical to digital products. We present an economic model that cha...
Gal Oestreicher-Singer, Arun Sundararajan
« Prev « First page 1112 / 1194 Last » Next »