-
1
-
-
10944272139
-
Friends and neighbors on the Web
-
DOI 10.1016/S0378-8733(03)00009-1, PII S0378873303000091
-
L. Adamic and E. Adar. Friends and neighbors on the web. Social Networks, 25:211-230, 2003. (Pubitemid 36831776)
-
(2003)
Social Networks
, vol.25
, Issue.3
, pp. 211-230
-
-
Adamic, L.A.1
Adar, E.2
-
3
-
-
0242552308
-
Authorization management for role-based collaboration
-
G. Ahn, L. Zhang, D. Shin, and B. Chu. Authorization management for role-based collaboration. In Proceedings of IEEE International Conference on System, Man and Cybernetic, pages 4128-4214, 2003.
-
(2003)
Proceedings of IEEE International Conference on System, Man and Cybernetic
, pp. 4128-4214
-
-
Ahn, G.1
Zhang, L.2
Shin, D.3
Chu, B.4
-
6
-
-
78650277787
-
Collaborative information system design
-
F. Benaben, J. Touzi, V. Rajsiri, and H.Pingaud. Collaborative information system design. In Proceedings of International Conference of the Association Information and Management, pages 281-296, 2006.
-
(2006)
Proceedings of International Conference of the Association Information and Management
, pp. 281-296
-
-
Benaben, F.1
Touzi, J.2
Rajsiri, V.3
Pingaud, H.4
-
8
-
-
31044450321
-
Graph theoretic and spectral analysis of Enron email data
-
DOI 10.1007/s10588-005-5381-4
-
A. Chapanond, M. Krishnamoorthy, and B. Yener. Graph theoretic and spectral analysis of Enron email data. Computational and Mathematical Organization Theory, 11:265-281, 2005. (Pubitemid 43118970)
-
(2005)
Computational and Mathematical Organization Theory
, vol.11
, Issue.3
, pp. 265-281
-
-
Chapanond, A.1
Krishnamoorthy, M.S.2
Yener, B.3
-
9
-
-
78650938596
-
Kaiser permanente marks completion of its electronic health records implementation
-
March 8
-
R. Charette. Kaiser Permanente marks completion of its electronic health records implementation. IEEE Spectrum, March 8 2010.
-
(2010)
IEEE Spectrum
-
-
Charette, R.1
-
10
-
-
76849086013
-
-
Accounting, Organizations and Society
-
L. Eldenburg, N. Soderstrom, V. Willis, and A. Wu. Behavioral changes following the collaborative development of an accounting information system. Accounting, Organizations and Society, 35(2):222-237, 2010.
-
(2010)
Behavioral Changes Following the Collaborative Development of an Accounting Information System
, vol.35
, Issue.2
, pp. 222-237
-
-
Eldenburg, L.1
Soderstrom, N.2
Willis, V.3
Wu, A.4
-
11
-
-
0035790754
-
Flexible team-based access control using contexts
-
C. Georgiadis, I. Mavridis, G. Pangalos, and R. Thomas. Flexible team-based access control using contexts. In Proceedings of ACM Symposium on Access Control Model and Technology, pages 21-27, 2001.
-
(2001)
Proceedings of ACM Symposium on Access Control Model and Technology
, pp. 21-27
-
-
Georgiadis, C.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.4
-
13
-
-
44549088088
-
Collective knowledge systems: Where the social web meets the semantic web
-
T. Gruber. Collective knowledge systems: where the social web meets the semantic web. Journal of Web Semantics, 6(1):4-13, 2007.
-
(2007)
Journal of Web Semantics
, vol.6
, Issue.1
, pp. 4-13
-
-
Gruber, T.1
-
14
-
-
0037410488
-
Discovering cluster-based local outliers
-
Z. He, X. Xu, and S. Deng. Discovering cluster-based local outliers. Pattern Recognition Letters, 24(9-10):1641 - 1650, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1641-1650
-
-
He, Z.1
Xu, X.2
Deng, S.3
-
15
-
-
47649119832
-
A collaborative support tool for creativity learning: Idea storming cube
-
C. Huang, T. Li, H. Wang, and C. Chang. A collaborative support tool for creativity learning: Idea storming cube. In Proceedings of the 2007 IEEE International Conference on Advanced Learning Technologies, pages 31-35, 2007.
-
(2007)
Proceedings of the 2007 IEEE International Conference on Advanced Learning Technologies
, pp. 31-35
-
-
Huang, C.1
Li, T.2
Wang, H.3
Chang, C.4
-
16
-
-
0001138328
-
A k-means clustering algorithm
-
J.A.Hartigan and M.A.Wong. A k-means clustering algorithm. Appl. Stat, 28:104-108, 1979.
-
(1979)
Appl. Stat
, vol.28
, pp. 104-108
-
-
Hartigan, J.A.1
Wong, M.A.2
-
18
-
-
4243128193
-
On clusterings: Good, bad and spectral
-
R. Kannan, S. Vempala, and A. Vetta. On clusterings: Good, bad and spectral. Journal of the ACM, 51(3):497-515, 2004.
-
(2004)
Journal of the ACM
, vol.51
, Issue.3
, pp. 497-515
-
-
Kannan, R.1
Vempala, S.2
Vetta, A.3
-
22
-
-
77953241534
-
-
Computing Research Repository, abs/0810.1355
-
J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters. Computing Research Repository, abs/0810.1355, 2008.
-
(2008)
Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters
-
-
Leskovec, J.1
Lang, K.J.2
Dasgupta, A.3
Mahoney, M.W.4
-
23
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
DOI 10.1016/S0167-4048(02)00514-X
-
Y. Liao and V. R. Vemuri. Use of k-nearest neighbor classifier for intrusion detection. Computer Security, 21(5):439-448, 2002. (Pubitemid 34835644)
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
24
-
-
37249012447
-
Social network profiles as taste performances
-
H. Liu. Social network profiles as taste performances. Journal of Computer-Mediated Communication, 13:252-275, 2008.
-
(2008)
Journal of Computer-mediated Communication
, vol.13
, pp. 252-275
-
-
Liu, H.1
-
25
-
-
34247395832
-
A longitudinal social network analysis of the editorial boards of medical informatics and bioinformatics journals
-
B. Malin and K. Carley. A longitudinal social network analysis of the editorial boards of medical informatics and bioinformatics journals. Journal of the American Medical Informatics Association, 14(3):340-347, 2007.
-
(2007)
Journal of the American Medical Informatics Association
, vol.14
, Issue.3
, pp. 340-347
-
-
Malin, B.1
Carley, K.2
-
26
-
-
33745956063
-
Reviewing the benefits and costs of electronic health records and associated patient safety technologies
-
DOI 10.1007/s10916-005-7988-x
-
N. Menachemi and R. Brooks. Reviewing the benefits and costs of electronic health records and associated patient safety technologies. Journal of Medical Systems, 30(3):159-168, 2008. (Pubitemid 44060918)
-
(2006)
Journal of Medical Systems
, vol.30
, Issue.3
, pp. 159-168
-
-
Menachemi, N.1
Brooks, R.G.2
-
27
-
-
57349105655
-
Mining roles with semantic meanings
-
th ACM Symposium on Access Control Models and Technologies, pages 21-30, 2008.
-
(2008)
th ACM Symposium on Access Control Models and Technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
29
-
-
84994391858
-
Role-based access control on the web
-
J. Park, R. Sandhu, and G. Ahn. Role-based access control on the web. ACM Transactions on Information and System Security, 4(1):37-71, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.1
Sandhu, R.2
Ahn., G.3
-
30
-
-
34548752457
-
Incremental local outlier detection for data streams
-
DOI 10.1109/CIDM.2007.368917, 4221341, Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007
-
D. Pokrajac, A. Lazarevic, and L. Latecki. Incremental local outlier detection for data streams. In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, pages 504-515, 2007. (Pubitemid 47431481)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007
, pp. 504-515
-
-
Pokrajac, D.1
Lazarevic, A.2
Latecki, L.J.3
-
31
-
-
4243116398
-
Countering terrorism through information technology
-
R. Popp. Countering terrorism through information technology. Communications of the ACM, 47(3):36-43, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 36-43
-
-
Popp, R.1
-
32
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
33
-
-
36849035459
-
Dynamic social network analysis using latent space models
-
P. Sarkar and A. Moore. Dynamic social network analysis using latent space models. ACM SIGKDD Explorations, 7:31-40, 2005.
-
(2005)
ACM SIGKDD Explorations
, vol.7
, pp. 31-40
-
-
Sarkar, P.1
Moore, A.2
-
35
-
-
27944506780
-
-
Institute for Nonlinear Science, University of California at San Diego
-
J. Shlens. A Tutorial on Principal Component Analysis. Institute for Nonlinear Science, University of California at San Diego, 2005.
-
(2005)
A Tutorial on Principal Component Analysis
-
-
Shlens, J.1
-
36
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang. A novel anomaly detection scheme based on principal component classifier. In IEEE Foundations and New Directions of Data Mining Workshop, pages 172-179, 2003.
-
(2003)
IEEE Foundations and New Directions of Data Mining Workshop
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
38
-
-
0036881508
-
Robust support vector machine with bullet hole image classification
-
Q. Song, W. Hu, and W. Xie. Robust support vector machine with bullet hole image classification. IEEE Transactions on Systems, Man, and Cybernetics, 32(4):440-448, 2002.
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.32
, Issue.4
, pp. 440-448
-
-
Song, Q.1
Hu, W.2
Xie, W.3
-
39
-
-
84945281435
-
Enhancing effectiveness of outlier detections for low density patterns
-
J. Tang, Z. Chen, A. Fu, and D. Cheung. Enhancing effectiveness of outlier detections for low density patterns. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining, pages 535-7548, 2002.
-
(2002)
Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining
, pp. 535-7548
-
-
Tang, J.1
Chen, Z.2
Fu, A.3
Cheung, D.4
-
42
-
-
34247540250
-
Games with a purpose
-
L. von Ahn. Games with a purpose. IEEE Computer, pages 96-98, 2006.
-
(2006)
IEEE Computer
, pp. 96-98
-
-
Von Ahn, L.1
-
43
-
-
0031466054
-
Collaborative management of chronic illness
-
M. von Korff, J. Gruman, J. Schaefer, S. Curry, and E. Wagner. Collaborative management of chronic illness. Annals of Internal Medicine, 127(12):1097-1102, 1997. (Pubitemid 28012080)
-
(1997)
Annals of Internal Medicine
, vol.127
, Issue.12
, pp. 1097-1102
-
-
Von Korff, M.1
Gruman, J.2
Schaefer, J.3
Curry, S.J.4
Wagner, E.H.5
-
44
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G. Ahn, and B. Chu. A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security, 6(3):404-441, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.2
Chu, B.3
|