Sciweavers

18155 search results - page 3621 / 3631
» Point
Sort
View
KDD
2012
ACM
164views Data Mining» more  KDD 2012»
13 years 1 days ago
SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs
Blockmodelling is an important technique for decomposing graphs into sets of roles. Vertices playing the same role have similar patterns of interactions with vertices in other rol...
Jeffrey Chan, Wei Liu, Christopher Leckie, James B...
KDD
2012
ACM
181views Data Mining» more  KDD 2012»
13 years 1 days ago
On "one of the few" objects
Objects with multiple numeric attributes can be compared within any “subspace” (subset of attributes). In applications such as computational journalism, users are interested i...
You Wu, Pankaj K. Agarwal, Chengkai Li, Jun Yang 0...
KDD
2012
ACM
168views Data Mining» more  KDD 2012»
13 years 1 days ago
Mining contentions from discussions and debates
Social media has become a major source of information for many applications. Numerous techniques have been proposed to analyze network structures and text contents. In this paper,...
Arjun Mukherjee, Bing Liu 0001
TON
2012
13 years 1 days ago
Some Fundamental Results on Base Station Movement Problem for Wireless Sensor Networks
—The benefits of using mobile base station to prolong sensor network lifetime have been well recognized. However, due to the complexity of the problem (time-dependent network to...
Yi Shi, Y. Thomas Hou
TON
2012
13 years 1 days ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
« Prev « First page 3621 / 3631 Last » Next »