Sciweavers

7839 search results - page 1229 / 1568
» What's there and what's not
Sort
View
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 11 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
140
Voted
SIGSOFT
2010
ACM
14 years 11 months ago
A study of the uniqueness of source code
This paper presents the results of the first study of the uniqueness of source code. We define the uniqueness of a unit of source code with respect to the entire body of written s...
Mark Gabel, Zhendong Su
SIGSOFT
2010
ACM
14 years 11 months ago
Synthesis of live behaviour models
We present a novel technique for synthesising behaviour models that works for an expressive subset of liveness properties and conforms to the foundational requirements engineering...
Nicolás D'Ippolito, Víctor A. Braber...
SOCIALCOM
2010
14 years 11 months ago
Finding Overlapping Communities in Social Networks
Increasingly, methods to identify community structure in networks have been proposed which allow groups to overlap. These methods have taken a variety of forms, resulting in a lack...
Mark K. Goldberg, Stephen Kelley, Malik Magdon-Ism...
SOCIALCOM
2010
14 years 11 months ago
A Scalable Framework for Modeling Competitive Diffusion in Social Networks
Multiple phenomena often diffuse through a social network, sometimes in competition with one another. Product adoption and political elections are two examples where network diffus...
Matthias Broecheler, Paulo Shakarian, V. S. Subrah...
« Prev « First page 1229 / 1568 Last » Next »