The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISI"( http://dblp.L3S.de/Venues/ISI )

URL (DBLP): http://dblp.uni-trier.de/db/conf/intelligent

Publication years (Num. hits)
1990 (47) 1991 (44) 1992 (35) 1994 (60) 1996 (36) 1998 (46) 2000 (19) 2002 (35) 2003 (41) 2004 (90) 2005 (101) 2006 (126) 2007 (126) 2008 (82) 2009 (130) 2010 (57) 2011 (149) 2012 (112) 2013 (199) 2014-2015 (114) 2016 (69) 2017 (107) 2018 (45) 2019 (64) 2020 (52) 2021 (69) 2023 (30)
Publication types (Num. hits)
inproceedings(2048) proceedings(37)
Venues (Conferences, Journals, ...)
ISI(2085)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 35 occurrences of 33 keywords

Results
Found 2085 publication records. Showing 2085 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Achim Osswald For You, Me, Them? - Choosing Designated Communities for Personal Digital Archiving. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dirk Lewandowski, Sebastian Sünkler, Friederike Kerkmann Are Ads on Google Search Engine Results Pages Labeled Clearly Enough? - The Influence of Knowledge on Search Ads on Users' Selection Behaviour. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elisabeth Vogler, Christoph Schindler 0001, Alexander Botte, Marc Rittberger Are Altmetrics Effective in Transdisciplinary Research Fields? - Altmetric Coverage of Outputs in Educational Research. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anthea Moravánszky How Can Social Software Enhance Training Measures within Software Implementations in the Financial Sector? Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexandra Linhart Google Now and User Data - A Diary Study on Perceptions of Collection and Use of Personal Data by Google Now Cards. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabian Muster Data Strategy Model - A Reference Model to Develop Data Strategies. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabian Odoni Development of Knowledge Management Performance Metrics for Enterprise Social Software. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eva-Maria Meier, Patricia Böhm, Christian Wolff 0001 Comparing Heuristic Walkthrough and User Studies in Evaluating Digital Appliances. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabian Odoni, Wolfgang Semar, Elena Mastrandrea VICI - Visualisation of Collaboration in Social Enterprise Software Systems. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Antje Michel "Information and Learning" - Research at the Interface between Information Science and the Learning Sciences. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Corinna Breitinger, Bela Gipp Virtual Patent - Enabling the Traceability of Ideas Shared Online Using Decentralized Trusted Timestamping. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vera Hillebrand, Elke Greifeneder International Degree Mobility in Library and Information Science. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ze Li, Duoyong Sun, Kun Cai, Bo Li 0030 Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carlos Caminha, Vasco Furtado Impact of human mobility on police allocation. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Neda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber Phishing detection: A recent intelligent machine learning comparison based on models content and features. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li A new approach to security informatics: Actionable behavioral rules mining (ABRM). Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yasmeen Alufaisan, Yan Zhou 0001, Murat Kantarcioglu, Bhavani Thuraisingham Hacking social network data mining. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qian Li, Xiu-cun Wang The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saike He, Xiaolong Zheng 0001, Daniel Zeng 0001 Modeling online collective emotions through knowledge transfer. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aaron Zimba, Zhaoshun Wang, Hongsong Chen Reasoning crypto ransomware infection vectors with Bayesian networks. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hongliang Liang, Yan Song, Da Xiao An end-to-end model for Android malware detection. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiangfei Kong, Wenji Mao Ranking events based on user relevant query. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia Enhance the robustness of cyber-physical systems by adding interdependency. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Junjie Lin, Wenji Mao, Daniel Zeng 0001 Topic and user based refinement for competitive perspective identification. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aaron Zimba, Zhaoshun Wang On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guandan Chen, Qingchao Kong, Wenji Mao An attention-based neural popularity prediction model for social media events. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen Assessing medical device vulnerabilities on the Internet of Things. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Song Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng Mapping users across social media platforms by integrating text and structure information. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wingyan Chung Developing curricular modules for cybersecurity informatics: An active learning approach. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dmitry Devyatkin, Ivan V. Smirnov, Ananyeva Margarita, Maria Kobozeva, Chepovskiy Andrey, Solovyev Fyodor Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts). Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017 Search on Bibsonomy ISI The full citation details ... 2017 DBLP  BibTeX  RDF
1Ravi Barreira, Vládia Pinheiro, Vasco Furtado A framework for digital forensics analysis based on semantic role labeling. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Linpeng Chai, Bin Zhang An identity-based one-off public key scheme for privacy preservation. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chiyu Cai, Linjing Li, Daniel Zeng 0001 Web-derived Emotional Word Detection in social media using Latent Semantic information. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sonya H. Y. Hsu, Steven J. Dick Information sharing & cyber threats. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charles Feng, Shuning Wu, Ningwei Liu A user-centric machine learning framework for cyber security operations center. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saike He, Xiaolong Zheng 0001, Daniel Zeng 0001 The dynamics of health sentiments with competitive interactions in social media. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou Raising flags: Detecting covert storage channels using relative entropy. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jin-Seong Kim, Im Young Jung Android app protection using same identifier attack defensor. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuhao Zhang, Wenji Mao, Daniel Zeng 0001 Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Beibei Tian, Feifei Zheng, Yuqi Cao Research on the relationship between informatization level and global competitiveness. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan Attack pattern mining algorithm based on security log. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei Wang 0137, Ming Zhu, Jinlin Wang 0001, Xuewen Zeng, Zhongzhen Yang End-to-end encrypted traffic classification with one-dimensional convolution neural networks. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi Prioritized active learning for malicious URL detection using weighted text-based features. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lu Luo, Peng Cao, Dazhong Mu Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang 0047, Huaglory Tianfield A novel approach for analysis of attack graph. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chiyu Cai, Linjing Li, Daniel Zeng 0001 Behavior enhanced deep bot detection in social media. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo Resolving reflection methods in Android applications. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai Alignment-free indexing-first-one hashing with bloom filter integration. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zihao Liu, Bin Zhang, Ning Zhu, Lixun Li Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tuomo Hiippala Recognizing military vehicles in social media images using deep learning. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng 0001 Real-time prediction of meme burst. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wingyan Chung, Elizabeth Mustaine, Daniel Zeng 0001 Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1C. Y. Tseung, Kam-Pui Chow, X. Zhang Extended abstract: Anti-DDoS technique using self-learning bloom filter. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao Linking social network accounts by modeling user spatiotemporal habits. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nan Xu Analyzing multimodal public sentiment based on hierarchical semantic attentional network. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang Impact of replacement policies on static-dynamic query results cache in web search engines. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Canchu Lin, Jenell L. S. Wittmer Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christopher Schon, Niall M. Adams, Marina Evangelou Clustering and monitoring edge behaviour in enterprise network traffic. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Su Hou, Tianliang Lu, Yanhui Du, Jing Guo Static detection of Android malware based on improved random forest algorithm. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung Efficient parameter selection for SVM: The case of business intelligence categorization. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guandan Chen, Qingchao Kong, Wenji Mao Online event detection and tracking in social media based on neural similarity metric learning. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Brandon W. Jones, Wingyan Chung Topic modeling of small sequential documents: Proposed experiments for detecting terror attacks. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sumeet Kumar, Kathleen M. Carley DDoS cyber-attacks network: Who's attacking whom. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benjamin W. K. Hung, Anura P. Jayasumana, Vidarshana W. Bandara Detecting radicalization trajectories using graph pattern matching algorithms. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vincent J. Ercolani, Mark W. Patton, Hsinchun Chen Shodan visualized. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick Rubin-Delanchy, Niall M. Adams, Nicholas A. Heard Disassortativity of computer networks. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leslie C. Milton, Atif Memon Intruder detector: A continuous authentication tool to model user behavior. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jie Bai, Linjing Li, Daniel Zeng 0001 Activating topic models from a cognitive perspective. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1E. Allison Newcomb, Robert J. Hammell, Steve E. Hutchinson Effective prioritization of network intrusion alerts to enhance situational awareness. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sumeet Kumar, Matthew Benigni, Kathleen M. Carley The impact of US cyber policies on cyber-attacks trend. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Melissa J. Turcotte, Juston S. Moore, Nick Heard, Aaron McPhall Poisson factorization for peer-based anomaly detection. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiang Michelle Liu, Diane R. Murphy Engaging females in cybersecurity: K through Gray. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei Wei, Arti Mann, Kewei Sha, T. Andrew Yang Design and implementation of a multi-facet hierarchical cybersecurity education framework. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Grisham, Calvin Barreras, Cyran Afarin, Mark W. Patton, Hsinchun Chen Identifying top listers in Alphabay using Latent Dirichlet Allocation. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arthur Jicha, Mark W. Patton, Hsinchun Chen SCADA honeypots: An in-depth analysis of Conpot. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow Automated big text security classification. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga Using cyber defense exercises to obtain additional data for attacker profiling. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jennifer Jie Xu 0001, Dongyu Chen, Michael Chau Identifying features for detecting fraudulent loan requests on P2P platforms. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan, Patrick T. Brandt, Bhavani Thuraisingham Near real-time atrocity event coding. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kangzhi Zhao, Yong Zhang 0002, Chunxiao Xing, Weifeng Li 0002, Hsinchun Chen Chinese underground market jargon analysis based on unsupervised learning. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Junjie Lin, Wenji Mao, Daniel Zeng 0001 Competitive perspective identification via topic based refinement for online documents. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mark Whitehouse, Marina Evangelou, Niall M. Adams Activity-based temporal anomaly detection in enterprise-cyber security. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang 0002, Chunxiao Xing, Weifeng Li 0002, Hsinchun Chen Exploring key hackers and cybersecurity threats in Chinese hacker communities. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Saike He, Xiaolong Zheng 0001, Jiaojiao Wang, Zhijun Chang, Yin Luo, Daniel Zeng 0001 Meme extraction and tracing in crisis events. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rodney Rohrmann, Mark W. Patton, Hsinchun Chen Anonymous port scanning: Performing network reconnaissance through Tor. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shiva Azadegan, Michael O'Leary An undergraduate Cyber Operations curriculum in the making: A 10+ year report. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jesus Pacheco, Shalaka Satam, Salim Hariri, Clarisa Grijalva, Helena Berkenbrock IoT Security Development Framework for building trustworthy Smart car services. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nick Heard, Konstantina Palla, Maria Skoularidou Topic modelling of authentication events in an enterprise computer network. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies Surfacing collaborated networks in dark web to find illicit and criminal content. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jie Bai, Linjing Li, Daniel Zeng 0001, Junjie Lin Social role clustering with topic model. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nick Heard, Patrick Rubin-Delanchy Network-wide anomaly detection via the Dirichlet process. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 2085 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license