Sciweavers

12052 search results - page 2093 / 2411
» computer 2010
Sort
View
99
Voted
SDM
2010
SIAM
129views Data Mining» more  SDM 2010»
14 years 11 months ago
Cross-Selling Optimization for Customized Promotion
The profit of a retail product not only comes from its own sales, but also comes from its influence on the sales of other products. How to promote the right products to the righ...
Nan Li, Yinghui Yang, Xifeng Yan
114
Voted
SDM
2010
SIAM
166views Data Mining» more  SDM 2010»
14 years 11 months ago
Directed Network Community Detection: A Popularity and Productivity Link Model
In this paper, we consider the problem of community detection in directed networks by using probabilistic models. Most existing probabilistic models for community detection are ei...
Tianbao Yang, Yun Chi, Shenghuo Zhu, Yihong Gong, ...
133
Voted
SEKE
2010
Springer
14 years 11 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
83
Voted
SIAMAM
2010
69views more  SIAMAM 2010»
14 years 11 months ago
Spatially Localized Structures in Diblock Copolymer Mixtures
Above the critical temperature for the order-disorder transition, diblock copolymer melts have been observed to exhibit localized structures that exist within the homogeneous mixtu...
Karl B. Glasner
85
Voted
SIAMAM
2010
96views more  SIAMAM 2010»
14 years 11 months ago
Mathematical Modeling of Vascular Stents
Abstract. We present a mathematical model for a study of the mechanical properties of endovascular stents in their expanded state. The model is based on the theory of slender curve...
Josip Tambaca, M. Kosor, Suncica Canic, D. Paniagu...
« Prev « First page 2093 / 2411 Last » Next »