Sciweavers

11328 search results - page 2253 / 2266
» Timed Branching Processes
Sort
View
WWW
2011
ACM
14 years 8 months ago
Limiting the spread of misinformation in social networks
In this work, we study the notion of competing campaigns in a social network. By modeling the spread of influence in the presence of competing campaigns, we provide necessary too...
Ceren Budak, Divyakant Agrawal, Amr El Abbadi
152
Voted
WWW
2011
ACM
14 years 8 months ago
Rewriting queries on SPARQL views
The problem of answering SPARQL queries over virtual SPARQL views is commonly encountered in a number of settings, including while enforcing security policies to access RDF data, ...
Wangchao Le, Songyun Duan, Anastasios Kementsietsi...
JAMIA
2010
116views more  JAMIA 2010»
14 years 8 months ago
Extracting Rx information from clinical narrative
Objective The authors used the i2b2 Medication Extraction Challenge to evaluate their entity extraction methods, contribute to the generation of a publicly available collection of...
James G. Mork, Olivier Bodenreider, Dina Demner-Fu...
137
Voted
JSAC
2010
153views more  JSAC 2010»
14 years 8 months ago
Autonomic traffic engineering for network robustness
Abstract--The continuously increasing complexity of communication networks and the increasing diversity and unpredictability of traffic demand has led to a consensus view that the ...
Ali Tizghadam, Alberto Leon-Garcia
PVLDB
2010
111views more  PVLDB 2010»
14 years 8 months ago
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic
The ever-increasing number of intrusions in public and commercial networks has created the need for high-speed archival solutions that continuously store streaming network data to...
Francesco Fusco, Marc Ph. Stoecklin, Michail Vlach...
« Prev « First page 2253 / 2266 Last » Next »