A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Social Network Analysis as Knowledge Discovery Process: A Case Study on Digital Bibliography
2009
2009 International Conference on Advances in Social Network Analysis and Mining
Our approach aims to apply the potential of social network analysis techniques to accomplish this task, using a network representation of bibliography data. ...
Besides we use some data mining techniques applied on social network representations in order to enrich this new point of view and to evolve our methodology towards a comprehensive local and global bibliography ...
In Section 2 we introduce some useful definitions on bibliography analysis, data mining techniques and social network analysis. In Section 3 we describe the workflow of our methodology. ...
doi:10.1109/asonam.2009.65
dblp:conf/asunam/CosciaGP09
fatcat:heu5ijgqxnfytnoom4ntj6jzne
Page 360 of IBM Systems Journal Vol. 9-13, Issue Cumulative Contents/Index
[page]
1970
IBM Systems Journal
Financial modeling on small systems Interactive simulation for banking Forecasting techniques
Direct-access device simulation
Skylab terminal system performance analysis Evaluation of storage hierarchies ...
system Experimental evaluation of system performance Skylab terminal system performance analysis
SIMULATION
Interactive flight program simulator
Model of paging system performance Modeling for computer ...
A guided bibliography to sorting
1971
IBM Systems Journal
Developing performance analysis methods for new techniques or new combinations of techniques requires facility in algebra and calculus. Algebra is often used to describe sorting processes. ...
Radke, “Merge-sort analysis by matrix techniques,” /BM Systems Journal 5, No. 4, 226-247 (1966). Various merges seen as operations on matrices. ...
doi:10.1147/sj.103.0244
fatcat:e7sttiwnj5ghzemi74nb6xlds4
Reversible Digital Watermarking: Theory and Practices
2014
Synthesis Lectures on Information Security Privacy and Trust
Reversible watermarking extensively depends on the analysis of high spatial correlation among neighboring pixels. ...
In the last chapter the authors have discussed the performance improvement of the techniques by detailing the tamper localization property. ...
In the last chapter the authors have discussed the performance improvement of the techniques by detailing the tamper localization property. ...
doi:10.2200/s00567ed1v01y201401spt010
fatcat:fmsx5qkltrambns4ozhug243ba
A bibliography of temporal, spatial and spatio-temporal data mining research
1999
SIGKDD Explorations
This short paper provides a few comments on this research and provides a bibliography of relevant research papers investigating temporal, spatial and spatiotemporal data mining. ...
At the same time, a greater recognition of the value of temporal and spatial data has been evident and the first papers looking at the confluence of these two areas are starting to emerge. ...
analysis of events ordered by one or more dimensions of time. ...
doi:10.1145/846170.846173
fatcat:7w6savnhebd6xocjsks25hsjqi
Subject index
1965
IEEE Transactions on Electronic Computers
on XVall Street is agement planning and control activities are i beP.Gesce. The initial applications of comexplored. ...
More recently, computers cussed. ...
of Patents for
Analog:
Joint Inventorship of 3562
Computation, Introduction to 3638
Series Analysis of On-Line 3630
Computers and Personnel, Performance
Computer Use in:
Block Design Using Digital ...
doi:10.1109/pgec.1965.264070
fatcat:7v5i5owjlfhxnff64ucyckjpbu
Page 109 of Journal of Research and Practice in Information Technology Vol. 28, Issue 3
[page]
1996
Journal of Research and Practice in Information Technology
exploit this technique to improve the cycles per instruction performance metric significantly while having minimal impact on cycle time and hardware cost. ...
Chapters show algorithms clearly, often with a reference to one of the twenty seven FORTRAN programs on the included computer disk. ...
Page 157 of Journal of Research and Practice in Information Technology Vol. 15, Issue 4
[page]
1983
Journal of Research and Practice in Information Technology
After an analysis of the layered model of protocols, a /a ISO/CCITT, it is applied to the analysis of the BERNET network, Berlin, which consists of several large host computers interconnec- ted by special ...
The paper ends with a useful bibliography .
6. ‘Simulation of a Hierarchically Connected Computer Net- work’ by W.L. Price. ...
Page 86 of The Journal of Industrial Engineering Vol. 18, Issue 1
[page]
1967
The Journal of Industrial Engineering
performance of a system. ...
There are discussions on the concepts of analysis and design, analysis by computer, problem-oriented languages, time-sharing, graphic display, computer programming as design, and the factors affecting ...
Page 1189 of Automation and Remote Control Vol. 21, Issue 12
[page]
1960
Automation and Remote Control
feedback analysis,— J.Instrum. ...
(Electrical simula- tion of control systems with several parameters)— 5 Strojnoelektrotechn, casop., 1958, t. 9, N 4, ‘s str, 217-230,
Prescott H, L.— Computer analyses voltage-regulator performance,— ...
The experimental literature of the internet: an annotated bibliography
1989
Computer communication review
It connects computer systems from almost every major vendor, using a wide variety of wide-area and local-area network technology, and is in continual use by thousands of people. ...
This annotated bibliography covers the literature of the Internet as an experiment: publications which convey the experience acquired by the experimenters. ...
I also made heavy use of the bibliographies of books by Douglas Comer [2] and Craig Partridge [4]. ...
doi:10.1145/66093.66096
fatcat:hoevmbljfffgbctb3qpky5omwe
Chapter VIII: Data Processing: Automation in Calculation
1960
Review of Educational Research
Ralston and Wilf (1960) text appears to be one of the few available in the general area of numerical analysis that is specif- ically concerned with modern computing techniques. ...
“IBM 709 FORTRAN Program for Test Battery Analysis." Educational and Psychological Measurement 19: 439-44; Autumn 1959.
MALcoLM, D. G. “Bibliography on the Use of Simulation in Management Analysis.” ...
doi:10.3102/00346543030005522
fatcat:k4t2sxgq4nbdjgksgz7y5emdwu
Analysis of the Publications on the Applications of Particle Swarm Optimisation
2008
Journal of Artificial Evolution and Applications
Within little more than a decade hundreds of papers have reported successful applications of PSO. ...
In fact, there are so many of them, that it is difficult for PSO practitioners and researchers to have a clear up-to-date vision of what has been done in the area of PSO applications. ...
One of the best-developed techniques of this type is particle swarm optimisation (PSO) [1] . ...
doi:10.1155/2008/685175
fatcat:2drnc5cyfjcj3gsgdfsb53osfe
A selected bibliography on parameter optimization methods suitable for hybrid computation
1967
Simulation (San Diego, Calif.)
index of system performance (or cost) is maximized (minimized). ...
The bibliography which follows lists the more important of these papers and in addition includes references which contain applicable mathematical theory, promising computational methods which have not ...
A selected bibliography on parameter optimization methods suitable for hybrid computation by ELMER G. ...
doi:10.1177/003754976700800610
fatcat:6p5rgh3crbflbigirfyg6frrwi
Page 177 of Computer Performance Vol. 5, Issue 3
[page]
1984
Computer Performance
Computer Architecture, Clearwater, USA (1976) pp 52-57
Sastry, K V and Kain, R Y ‘On the performance of certain multiprocessor computer organisation’ [EEE Trans. Comput. ...
Vol C-28 No 2 (1979)
Fung, K T and Torng, H C ‘On the analysis of memory conflicts and bus contentions in a multiple microprocessor system’ /EEE Trans. Comput. ...
« Previous
Showing results 1 — 15 out of 64,479 results