64,479 Hits in 7.6 sec

Social Network Analysis as Knowledge Discovery Process: A Case Study on Digital Bibliography

Michele Coscia, Fosca Giannotti, Ruggero Pensa
2009 2009 International Conference on Advances in Social Network Analysis and Mining  
Our approach aims to apply the potential of social network analysis techniques to accomplish this task, using a network representation of bibliography data.  ...  Besides we use some data mining techniques applied on social network representations in order to enrich this new point of view and to evolve our methodology towards a comprehensive local and global bibliography  ...  In Section 2 we introduce some useful definitions on bibliography analysis, data mining techniques and social network analysis. In Section 3 we describe the workflow of our methodology.  ... 
doi:10.1109/asonam.2009.65 dblp:conf/asunam/CosciaGP09 fatcat:heu5ijgqxnfytnoom4ntj6jzne

Page 360 of IBM Systems Journal Vol. 9-13, Issue Cumulative Contents/Index [page]

1970 IBM Systems Journal  
Financial modeling on small systems Interactive simulation for banking Forecasting techniques Direct-access device simulation Skylab terminal system performance analysis Evaluation of storage hierarchies  ...  system Experimental evaluation of system performance Skylab terminal system performance analysis SIMULATION Interactive flight program simulator Model of paging system performance Modeling for computer  ... 

A guided bibliography to sorting

H. Lorin
1971 IBM Systems Journal  
Developing performance analysis methods for new techniques or new combinations of techniques requires facility in algebra and calculus. Algebra is often used to describe sorting processes.  ...  Radke, “Merge-sort analysis by matrix techniques,” /BM Systems Journal 5, No. 4, 226-247 (1966). Various merges seen as operations on matrices.  ... 
doi:10.1147/sj.103.0244 fatcat:e7sttiwnj5ghzemi74nb6xlds4

Reversible Digital Watermarking: Theory and Practices

Ruchira Naskar, Rajat Subhra Chakraborty
2014 Synthesis Lectures on Information Security Privacy and Trust  
Reversible watermarking extensively depends on the analysis of high spatial correlation among neighboring pixels.  ...  In the last chapter the authors have discussed the performance improvement of the techniques by detailing the tamper localization property.  ...  In the last chapter the authors have discussed the performance improvement of the techniques by detailing the tamper localization property.  ... 
doi:10.2200/s00567ed1v01y201401spt010 fatcat:fmsx5qkltrambns4ozhug243ba

A bibliography of temporal, spatial and spatio-temporal data mining research

John F. Roddick, Myra Spiliopoulou
1999 SIGKDD Explorations  
This short paper provides a few comments on this research and provides a bibliography of relevant research papers investigating temporal, spatial and spatiotemporal data mining.  ...  At the same time, a greater recognition of the value of temporal and spatial data has been evident and the first papers looking at the confluence of these two areas are starting to emerge.  ...  analysis of events ordered by one or more dimensions of time.  ... 
doi:10.1145/846170.846173 fatcat:7w6savnhebd6xocjsks25hsjqi

Subject index

William Pierce
1965 IEEE Transactions on Electronic Computers  
on XVall Street is agement planning and control activities are i beP.Gesce. The initial applications of comexplored.  ...  More recently, computers cussed.  ...  of Patents for Analog: Joint Inventorship of 3562 Computation, Introduction to 3638 Series Analysis of On-Line 3630 Computers and Personnel, Performance Computer Use in: Block Design Using Digital  ... 
doi:10.1109/pgec.1965.264070 fatcat:7v5i5owjlfhxnff64ucyckjpbu

Page 109 of Journal of Research and Practice in Information Technology Vol. 28, Issue 3 [page]

1996 Journal of Research and Practice in Information Technology  
exploit this technique to improve the cycles per instruction performance metric significantly while having minimal impact on cycle time and hardware cost.  ...  Chapters show algorithms clearly, often with a reference to one of the twenty seven FORTRAN programs on the included computer disk.  ... 

Page 157 of Journal of Research and Practice in Information Technology Vol. 15, Issue 4 [page]

1983 Journal of Research and Practice in Information Technology  
After an analysis of the layered model of protocols, a /a ISO/CCITT, it is applied to the analysis of the BERNET network, Berlin, which consists of several large host computers interconnec- ted by special  ...  The paper ends with a useful bibliography . 6. ‘Simulation of a Hierarchically Connected Computer Net- work’ by W.L. Price.  ... 

Page 86 of The Journal of Industrial Engineering Vol. 18, Issue 1 [page]

1967 The Journal of Industrial Engineering  
performance of a system.  ...  There are discussions on the concepts of analysis and design, analysis by computer, problem-oriented languages, time-sharing, graphic display, computer programming as design, and the factors affecting  ... 

Page 1189 of Automation and Remote Control Vol. 21, Issue 12 [page]

1960 Automation and Remote Control  
feedback analysis,— J.Instrum.  ...  (Electrical simula- tion of control systems with several parameters)— 5 Strojnoelektrotechn, casop., 1958, t. 9, N 4, ‘s str, 217-230, Prescott H, L.— Computer analyses voltage-regulator performance,—  ... 

The experimental literature of the internet: an annotated bibliography

Jeffrey C. Mogul
1989 Computer communication review  
It connects computer systems from almost every major vendor, using a wide variety of wide-area and local-area network technology, and is in continual use by thousands of people.  ...  This annotated bibliography covers the literature of the Internet as an experiment: publications which convey the experience acquired by the experimenters.  ...  I also made heavy use of the bibliographies of books by Douglas Comer [2] and Craig Partridge [4].  ... 
doi:10.1145/66093.66096 fatcat:hoevmbljfffgbctb3qpky5omwe

Chapter VIII: Data Processing: Automation in Calculation

E. Wayne Martin, Dale J. Hall
1960 Review of Educational Research  
Ralston and Wilf (1960) text appears to be one of the few available in the general area of numerical analysis that is specif- ically concerned with modern computing techniques.  ...  “IBM 709 FORTRAN Program for Test Battery Analysis." Educational and Psychological Measurement 19: 439-44; Autumn 1959. MALcoLM, D. G. “Bibliography on the Use of Simulation in Management Analysis.”  ... 
doi:10.3102/00346543030005522 fatcat:k4t2sxgq4nbdjgksgz7y5emdwu

Analysis of the Publications on the Applications of Particle Swarm Optimisation

Riccardo Poli
2008 Journal of Artificial Evolution and Applications  
Within little more than a decade hundreds of papers have reported successful applications of PSO.  ...  In fact, there are so many of them, that it is difficult for PSO practitioners and researchers to have a clear up-to-date vision of what has been done in the area of PSO applications.  ...  One of the best-developed techniques of this type is particle swarm optimisation (PSO) [1] .  ... 
doi:10.1155/2008/685175 fatcat:2drnc5cyfjcj3gsgdfsb53osfe

A selected bibliography on parameter optimization methods suitable for hybrid computation

Elmer G. Gilbert
1967 Simulation (San Diego, Calif.)  
index of system performance (or cost) is maximized (minimized).  ...  The bibliography which follows lists the more important of these papers and in addition includes references which contain applicable mathematical theory, promising computational methods which have not  ...  A selected bibliography on parameter optimization methods suitable for hybrid computation by ELMER G.  ... 
doi:10.1177/003754976700800610 fatcat:6p5rgh3crbflbigirfyg6frrwi

Page 177 of Computer Performance Vol. 5, Issue 3 [page]

1984 Computer Performance  
Computer Architecture, Clearwater, USA (1976) pp 52-57 Sastry, K V and Kain, R Y ‘On the performance of certain multiprocessor computer organisation’ [EEE Trans. Comput.  ...  Vol C-28 No 2 (1979) Fung, K T and Torng, H C ‘On the analysis of memory conflicts and bus contentions in a multiple microprocessor system’ /EEE Trans. Comput.  ... 
« Previous Showing results 1 — 15 out of 64,479 results