-
1
-
-
84911211926
-
Uncovering deception in social media
-
H. Liu, J. Han, and H. Motoda, "Uncovering deception in social media, " Social Netw. Anal. Mining, vol. 4, no. 1, pp. 1-2, 2014.
-
(2014)
Social Netw. Anal. Mining
, vol.4
, Issue.1
, pp. 1-2
-
-
Liu, H.1
Han, J.2
Motoda, H.3
-
2
-
-
84866599022
-
Poultry markets: On the underground economy of Twitter followers
-
G. Stringhini, M. Egele, C. Kruegel, and G. Vigna, "Poultry markets: On the underground economy of Twitter followers, " in Proc. ACM Workshop Workshop Online Social Netw., 2012, pp. 1-6.
-
(2012)
Proc. ACM Workshop Workshop Online Social Netw.
, pp. 1-6
-
-
Stringhini, G.1
Egele, M.2
Kruegel, C.3
Vigna, G.4
-
3
-
-
84890091177
-
Follow the green: Growth and dynamics in Twitter follower markets
-
G. Stringhini, et al., "Follow the green: Growth and dynamics in Twitter follower markets, " in Proc. 13th ACM SIGCOMM Internet Meas. Conf., 2013, pp. 163-176.
-
(2013)
Proc. 13th ACM SIGCOMM Internet Meas. Conf.
, pp. 163-176
-
-
Stringhini, G.1
-
4
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse, " in Proc. 22nd USENIX Secur. Symp., 2013, pp. 195-210.
-
(2013)
Proc. 22nd USENIX Secur. Symp.
, pp. 195-210
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
5
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
K. Lee, J. Caverlee, and S. Webb, "Uncovering social spammers: Social honeypots + machine learning, " in Proc. 33rd Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2010, pp. 435-442.
-
(2010)
Proc. 33rd Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval
, pp. 435-442
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
6
-
-
78751502334
-
Detecting spammers on social networks
-
G. Stringhini, C. Kruegel, and G. Vigna, "Detecting spammers on social networks, " in Proc. 26th Annu. Comput. Secur. Appl. Conf., 2010, pp. 1-9.
-
(2010)
Proc. 26th Annu. Comput. Secur. Appl. Conf.
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
7
-
-
74049087026
-
Community detection in graphs
-
S. Fortunato, "Community detection in graphs, " Phys. Rep., vol. 486, no. 3, pp. 75-174, 2010.
-
(2010)
Phys. Rep.
, vol.486
, Issue.3
, pp. 75-174
-
-
Fortunato, S.1
-
8
-
-
84860851065
-
Understanding and combating link farming in the Twitter social network
-
S. Ghosh, et al., "Understanding and combating link farming in the Twitter social network, " in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 61-70.
-
(2012)
Proc. 21st Int. Conf. World Wide Web
, pp. 61-70
-
-
Ghosh, S.1
-
9
-
-
84880557073
-
Empirical evaluation and new design for fighting evolving Twitter spammers
-
Aug.
-
C. Yang, R. Harkreader, and G. Gu, "Empirical evaluation and new design for fighting evolving Twitter spammers, " IEEE Trans. Inf. Forensics Secur., vol. 8, no. 8, pp. 1280-1293, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.8
, pp. 1280-1293
-
-
Yang, C.1
Harkreader, R.2
Gu, G.3
-
10
-
-
84908211123
-
Online social spammer detection
-
X. Hu, J. Tang, and H. Liu, "Online social spammer detection, " in Proc. 28th AAAI Conf. Artif. Intell., 2014, pp. 59-65.
-
(2014)
Proc. 28th AAAI Conf. Artif. Intell.
, pp. 59-65
-
-
Hu, X.1
Tang, J.2
Liu, H.3
-
11
-
-
84977071823
-
The rise of social bots
-
E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, "The rise of social bots, " Commun. ACM, vol. 59, no. 7, pp. 96-104, 2016.
-
(2016)
Commun. ACM
, vol.59
, Issue.7
, pp. 96-104
-
-
Ferrara, E.1
Varol, O.2
Davis, C.3
Menczer, F.4
Flammini, A.5
-
12
-
-
84978971731
-
Catching synchronized behaviors in large networks: A graph mining approach
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Catching synchronized behaviors in large networks: A graph mining approach, " ACM Trans. Knowl. Discovery Data, vol. 10, no. 4, 2016, Art. no. 35.
-
(2016)
ACM Trans. Knowl. Discovery Data
, vol.10
, Issue.4
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
13
-
-
84904183969
-
Prediction of human activity by discovering temporal sequence patterns
-
Aug.
-
K. Li and Y. Fu, "Prediction of human activity by discovering temporal sequence patterns, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 36, no. 8, pp. 1644-1657, Aug. 2014.
-
(2014)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.36
, Issue.8
, pp. 1644-1657
-
-
Li, K.1
Fu, Y.2
-
14
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "The socialbot network: When bots socialize for fame and money, " in Proc. 27th Annu. Comput. Secur. Appl. Conf., 2011, pp. 93-102.
-
(2011)
Proc. 27th Annu. Comput. Secur. Appl. Conf.
, pp. 93-102
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
15
-
-
84866593784
-
Detecting automation of Twitter accounts: Are you a human, bot, or cyborg?
-
Nov./Dec.
-
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, "Detecting automation of Twitter accounts: Are you a human, bot, or cyborg?" IEEE Trans. Depend. Secure Comput., vol. 9, no. 6, pp. 811-824, Nov./Dec. 2012.
-
(2012)
IEEE Trans. Depend. Secure Comput.
, vol.9
, Issue.6
, pp. 811-824
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
16
-
-
84945161749
-
Fame for sale: Efficient detection of fake Twitter followers
-
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, "Fame for sale: Efficient detection of fake Twitter followers, " Decision Support Syst., vol. 80, pp. 56-71, 2015.
-
(2015)
Decision Support Syst.
, vol.80
, pp. 56-71
-
-
Cresci, S.1
Di Pietro, R.2
Petrocchi, M.3
Spognardi, A.4
Tesconi, M.5
-
17
-
-
84988422064
-
A criticism to society (as seen by Twitter analytics)
-
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, "A criticism to society (as seen by Twitter analytics), " in Proc. IEEE 1st Int. Workshop Big Data Anal. Secur., Jun. 2014, pp. 194-200.
-
(2014)
Proc. IEEE 1st Int. Workshop Big Data Anal. Secur., Jun.
, pp. 194-200
-
-
Cresci, S.1
Di Pietro, R.2
Petrocchi, M.3
Spognardi, A.4
Tesconi, M.5
-
18
-
-
84871971372
-
Towards online spam filtering in social networks
-
H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. N. Choudhary, "Towards online spam filtering in social networks, " in Proc. Netw. Distrib. Syst. Secur. Symp., 2012, pp. 1-16.
-
(2012)
Proc. Netw. Distrib. Syst. Secur. Symp.
, pp. 1-16
-
-
Gao, H.1
Chen, Y.2
Lee, K.3
Palsetia, D.4
Choudhary, A.N.5
-
19
-
-
84877300575
-
WarningBird: A near real-time detection system for suspicious URLs in Twitter stream
-
May/Jun.
-
S. Lee and J. Kim, "WarningBird: A near real-time detection system for suspicious URLs in Twitter stream, " IEEE Trans. Depend. Secure Comput., vol. 10, no. 3, pp. 183-195, May/Jun. 2013.
-
(2013)
IEEE Trans. Depend. Secure Comput.
, vol.10
, Issue.3
, pp. 183-195
-
-
Lee, S.1
Kim, J.2
-
20
-
-
80051985554
-
Design and evaluation of a real-time URL spam filtering service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, "Design and evaluation of a real-time URL spam filtering service, " in Proc. IEEE 32nd Symp. Secur. Privacy, 2011, pp. 447-462.
-
(2011)
Proc. IEEE 32nd Symp. Secur. Privacy
, pp. 447-462
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
21
-
-
84954546290
-
Spam ain't as diverse as it seems: Throttling OSN spam with templates underneath
-
H. Gao, et al., "Spam ain't as diverse as it seems: Throttling OSN spam with templates underneath, " in Proc. 30th Annu. Comput. Secur. Appl. Conf., 2014, pp. 76-85.
-
(2014)
Proc. 30th Annu. Comput. Secur. Appl. Conf.
, pp. 76-85
-
-
Gao, H.1
-
22
-
-
84911100037
-
SDHM: A hybrid model for spammer detection in Weibo
-
Y. Liu, B. Wu, B. Wang, and G. Li, "SDHM: A hybrid model for spammer detection in Weibo, " in Proc. IEEE/ACM Int. Conf. Advances Social Netw. Anal. Mining, 2014, pp. 942-947.
-
(2014)
Proc. IEEE/ACM Int. Conf. Advances Social Netw. Anal. Mining
, pp. 942-947
-
-
Liu, Y.1
Wu, B.2
Wang, B.3
Li, G.4
-
23
-
-
84896964777
-
Uncovering social network sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai, "Uncovering social network sybils in the wild, " ACM Trans. Knowl. Discovery Data, vol. 8, no. 1, 2014, Art. no. 2.
-
(2014)
ACM Trans. Knowl. Discovery Data
, vol.8
, Issue.1
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
24
-
-
84893095820
-
CopyCatch: Stopping group attacks by spotting lockstep behavior in social networks
-
A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos, "CopyCatch: stopping group attacks by spotting lockstep behavior in social networks, " in Proc. 22nd Int. Conf. World Wide Web, 2013, pp. 119-130.
-
(2013)
Proc. 22nd Int. Conf. World Wide Web
, pp. 119-130
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
25
-
-
84944623184
-
Inferring lockstep behavior from connectivity pattern in large graphs
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, "Inferring lockstep behavior from connectivity pattern in large graphs, " Knowl. Inf. Syst., vol. 48, no. 2, pp. 399-428, 2015.
-
(2015)
Knowl. Inf. Syst.
, vol.48
, Issue.2
, pp. 399-428
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
26
-
-
84945531564
-
ND-Sync: Detecting synchronized fraud activities
-
M. Giatsoglou, D. Chatzakou, N. Shah, A. Beutel, C. Faloutsos, and A. Vakali, "ND-Sync: Detecting synchronized fraud activities, " in Proc. 19th Pacific Asia Conf. Advances Knowl. Discovery Data Mining, 2015, pp. 201-214.
-
(2015)
Proc. 19th Pacific Asia Conf. Advances Knowl. Discovery Data Mining
, pp. 201-214
-
-
Giatsoglou, M.1
Chatzakou, D.2
Shah, N.3
Beutel, A.4
Faloutsos, C.5
Vakali, A.6
-
27
-
-
84910660900
-
Uncovering large groups of active malicious accounts in online social networks
-
Q. Cao, X. Yang, J. Yu, and C. Palow, "Uncovering large groups of active malicious accounts in online social networks, " in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2014, pp. 477-488.
-
(2014)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 477-488
-
-
Cao, Q.1
Yang, X.2
Yu, J.3
Palow, C.4
-
28
-
-
84946022328
-
GLAD: Group anomaly detection in social media analysis
-
R. Yu, X. He, and Y. Liu, "GLAD: Group anomaly detection in social media analysis, " ACM Trans. Knowl. Discovery Data, vol. 10, no. 2, pp. 1-22, 2015.
-
(2015)
ACM Trans. Knowl. Discovery Data
, vol.10
, Issue.2
, pp. 1-22
-
-
Yu, R.1
He, X.2
Liu, Y.3
-
29
-
-
84960156560
-
Probabilistic attributed hashing
-
M. Ou, P. Cui, J. Wang, F. Wang, and W. Zhu, "Probabilistic attributed hashing, " in Proc. AAAI Conf. Artif. Intell., 2015, pp. 2894-2900.
-
(2015)
Proc. AAAI Conf. Artif. Intell.
, pp. 2894-2900
-
-
Ou, M.1
Cui, P.2
Wang, J.3
Wang, F.4
Zhu, W.5
-
30
-
-
84878359270
-
A generic statistical approach for spam detection in online social networks
-
F. Ahmed and M. Abulaish, "A generic statistical approach for spam detection in online social networks, " Comput. Commun., vol. 36, no. 10, pp. 1120-1129, 2013.
-
(2013)
Comput. Commun.
, vol.36
, Issue.10
, pp. 1120-1129
-
-
Ahmed, F.1
Abulaish, M.2
-
31
-
-
84891736632
-
Twitter spammer detection using data stream clustering
-
Z. Miller, B. Dickinson, W. Deitrick, W. Hu, and A. H. Wang, "Twitter spammer detection using data stream clustering, " Inf. Sci., vol. 260, pp. 64-73, 2014.
-
(2014)
Inf. Sci.
, vol.260
, pp. 64-73
-
-
Miller, Z.1
Dickinson, B.2
Deitrick, W.3
Hu, W.4
Wang, A.H.5
-
32
-
-
84991501244
-
DNA-inspired online behavioral modeling and its application to spambot detection
-
Sep./Oct.
-
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, "DNA-inspired online behavioral modeling and its application to spambot detection, " IEEE Intell. Syst., vol. 31, no. 5, pp. 58-64, Sep./Oct. 2016.
-
(2016)
IEEE Intell. Syst.
, vol.31
, Issue.5
, pp. 58-64
-
-
Cresci, S.1
Di Pietro, R.2
Petrocchi, M.3
Spognardi, A.4
Tesconi, M.5
-
34
-
-
0017360990
-
The measurement of observer agreement for categorical data
-
J. R. Landis and G. G. Koch, "The measurement of observer agreement for categorical data, " Biometrics, vol. 33, pp. 159-174, 1977.
-
(1977)
Biometrics
, vol.33
, pp. 159-174
-
-
Landis, J.R.1
Koch, G.G.2
-
35
-
-
85038368785
-
Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing
-
M. Avvenuti, S. Bellomo, S. Cresci, M. N. La Polla, and M. Tesconi, "Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing, " in Proc. 26th World Wide Web Conf., 2017.
-
(2017)
Proc. 26th World Wide Web Conf.
-
-
Avvenuti, M.1
Bellomo, S.2
Cresci, S.3
La Polla, M.N.4
Tesconi, M.5
-
37
-
-
77956025040
-
Short text classification in Twitter to improve information filtering
-
B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demi-rbas, "Short text classification in Twitter to improve information filtering, " in Proc. 33rd Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2010, pp. 841-842.
-
(2010)
Proc. 33rd Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval
, pp. 841-842
-
-
Sriram, B.1
Fuhry, D.2
Demir, E.3
Ferhatosmanoglu, H.4
Demi-Rbas, M.5
-
38
-
-
84863157333
-
Twitter trending topic classification
-
K. Lee, D. Palsetia, R. Narayanan, M. M. A. Patwary, A. Agrawal, and A. Choudhary, "Twitter trending topic classification, " in Proc. IEEE 11th Int. Conf. Data Mining Workshops, 2011, pp. 251-258.
-
(2011)
Proc. IEEE 11th Int. Conf. Data Mining Workshops
, pp. 251-258
-
-
Lee, K.1
Palsetia, D.2
Narayanan, R.3
Patwary, M.M.A.4
Agrawal, A.5
Choudhary, A.6
-
40
-
-
79959196151
-
Linear time algorithms for generalizations of the longest common substring problem
-
M. Arnold and E. Ohlebusch, "Linear time algorithms for generalizations of the longest common substring problem, " Algorithmica, vol. 60, no. 4, pp. 806-818, 2011.
-
(2011)
Algorithmica
, vol.60
, Issue.4
, pp. 806-818
-
-
Arnold, M.1
Ohlebusch, E.2
-
41
-
-
85006627991
-
Color set size problem with applications to string matching
-
Berlin, Germany: Springer
-
L. Chi and K. Hui, "Color set size problem with applications to string matching, " in Combinatorial Pattern Matching. Berlin, Germany: Springer, 1992, pp. 230-243.
-
(1992)
Combinatorial Pattern Matching
, pp. 230-243
-
-
Chi, L.1
Hui, K.2
-
42
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, "An introduction to ROC analysis, " Pattern Recognit. Lett., vol. 27, no. 8, pp. 861-874, 2006.
-
(2006)
Pattern Recognit. Lett.
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
43
-
-
0033931867
-
Assessing the accuracy of prediction algorithms for classification: An overview
-
P. Baldi, S. Brunak, Y. Chauvin, and H. Nielsen, "Assessing the accuracy of prediction algorithms for classification: An overview, " Bioinf., vol. 16, no. 5, pp. 412-424, 2000.
-
(2000)
Bioinf.
, vol.16
, Issue.5
, pp. 412-424
-
-
Baldi, P.1
Brunak, S.2
Chauvin, Y.3
Nielsen, H.4
-
44
-
-
77956031473
-
A survey on transfer learning
-
Oct.
-
S. J. Pan and Q. Yang, "A survey on transfer learning, " IEEE Trans. Knowl. Data Eng., vol. 22, no. 10, pp. 1345-1359, Oct. 2010.
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.10
, pp. 1345-1359
-
-
Pan, S.J.1
Yang, Q.2
-
46
-
-
84867410703
-
Nowcasting events from the social web with statistical learning
-
V. Lampos and N. Cristianini, "Nowcasting events from the social web with statistical learning, " ACM Trans. Intell. Syst. Technol., vol. 3, no. 4, 2012, Art. no. 72.
-
(2012)
ACM Trans. Intell. Syst. Technol.
, vol.3
, Issue.4
-
-
Lampos, V.1
Cristianini, N.2
-
47
-
-
85049804750
-
-
Twitter Inc Oct 2013. [Online] Last checked Dec. 07, 2016
-
Twitter Inc., "Twitter's IPO filing, " Oct 2013. [Online]. Available: https://goo.gl/pbXxHh, Last checked Dec. 07, 2016.
-
Twitter's IPO Filing
-
-
-
48
-
-
0001290841
-
Glossary of terms
-
R. Kohavi and F. Provost, "Glossary of terms, " Mach. Learn., vol. 30, no. 2/3, pp. 271-274, 1998.
-
(1998)
Mach. Learn.
, vol.30
, Issue.2-3
, pp. 271-274
-
-
Kohavi, R.1
Provost, F.2
-
49
-
-
84864758525
-
Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation
-
D. M. W. Powers, "Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation, " Int. J. Mach. Learn. Technol., vol. 2, no. 1, pp. 37-63, 2011.
-
(2011)
Int. J. Mach. Learn. Technol.
, vol.2
, Issue.1
, pp. 37-63
-
-
Powers, D.M.W.1
-
50
-
-
33947366442
-
A fast parallel algorithm for finding the longest common sequence of multiple biosequences
-
Y. Chen, A. Wan, and W. Liu, "A fast parallel algorithm for finding the longest common sequence of multiple biosequences, " BMC Bioinf., vol. 7, no. 4, 2006, Art. no. 1.
-
(2006)
BMC Bioinf.
, vol.7
, Issue.4
-
-
Chen, Y.1
Wan, A.2
Liu, W.3
-
51
-
-
84858438065
-
Characterizing user navigation and interactions in online social networks
-
F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, "Characterizing user navigation and interactions in online social networks, " Inf. Sci., vol. 195, pp. 1-24, 2012.
-
(2012)
Inf. Sci.
, vol.195
, pp. 1-24
-
-
Benevenuto, F.1
Rodrigues, T.2
Cha, M.3
Almeida, V.4
-
52
-
-
85029269023
-
Towards detecting anomalous user behavior in online social networks
-
B. Viswanath, et al., "Towards detecting anomalous user behavior in online social networks, " in Proc. 23rd USENIX Secur. Symp., 2014, pp. 223-238.
-
(2014)
Proc. 23rd USENIX Secur. Symp.
, pp. 223-238
-
-
Viswanath, B.1
-
53
-
-
84964866895
-
Profiling online social behaviors for compromised account detection
-
Jan.
-
X. Ruan, Z. Wu, H. Wang, and S. Jajodia, "Profiling online social behaviors for compromised account detection, " IEEE Trans. Inf. Forensics Secur., vol. 11, no. 1, pp. 176-187, Jan. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.1
, pp. 176-187
-
-
Ruan, X.1
Wu, Z.2
Wang, H.3
Jajodia, S.4
-
54
-
-
77953651084
-
In-depth behavior understanding and use: The behavior informatics approach
-
L. Cao, "In-depth behavior understanding and use: The behavior informatics approach, " Inf. Sci., vol. 180, no. 17, pp. 3067-3085, 2010.
-
(2010)
Inf. Sci.
, vol.180
, Issue.17
, pp. 3067-3085
-
-
Cao, L.1
-
55
-
-
84927939029
-
Why the Monte Carlo method is so important today
-
D. P. Kroese, T. Brereton, T. Taimre, and Z. I. Botev, "Why the Monte Carlo method is so important today, " Wiley Interdisciplinary Rev.: Computat. Statist., vol. 6, no. 6, pp. 386-392, 2014.
-
(2014)
Wiley Interdisciplinary Rev.: Computat. Statist.
, vol.6
, Issue.6
, pp. 386-392
-
-
Kroese, D.P.1
Brereton, T.2
Taimre, T.3
Botev, Z.I.4
-
56
-
-
84964528874
-
A survey of longest common subsequence algorithms
-
L. Bergroth, H. Hakonen, and T. Raita, "A survey of longest common subsequence algorithms, " in Proc. 7th Int. Symp. String Process. Inf. Retrieval, 2000, pp. 39-48.
-
(2000)
Proc. 7th Int. Symp. String Process. Inf. Retrieval
, pp. 39-48
-
-
Bergroth, L.1
Hakonen, H.2
Raita, T.3
|