Sciweavers

2846 search results - page 508 / 570
» Personalization of a Trust Network
Sort
View
101
Voted
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
16 years 28 days ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
108
Voted
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 28 days ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
98
Voted
CHI
2005
ACM
16 years 28 days ago
Harnessing mobile ubiquitous video
We are rapidly moving toward a world where personal networked video cameras are ubiquitous. Already, camera-equipped cell phones are becoming commonplace. Imagine being able to ta...
Neil J. McCurdy, Jennifer N. Carlisle, William G. ...
172
Voted
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
16 years 20 days ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
92
Voted
MOBISYS
2008
ACM
16 years 4 days ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...