what-when-how
In Depth Tutorials and Information
2. Hussain, D. M. 2007. Terrorist networks analysis through argument driven hypotheses
model. In ProceedingsoftheSecondInternationalConferenceonAvailability,Reliability
andSecurity (April 10-13, 2007). ARES. IEEE Computer Society, Washington, DC,
480-492.
3. Kossinets, G., Kleinberg, J., and Watts, D. 2008. he structure of information path-
ways in a social communication network. In Proceeding of the 14th ACM SIGKDD
InternationalConferenceonKnowledgeDiscoveryandDataMining (Las Vegas, Nevada,
August 24-27, 2008). KDD '08. ACM, New York, 435-443.
4. Liben-Nowell, D. and Kleinberg, J. 2003. he link prediction problem for social
networks. In Proceedings of the Twelfth International Conference on Information and
Knowledge Management (New Orleans, LA, November 03-08, 2003). CIKM '03.
ACM, New York, 556-559.
5. Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., and Bhattacharjee, B. 2007.
Measurement and analysis of online social networks. In Proceedings of the 7th ACM
SIGCOMM Conference on Internet Measurement (San Diego, California, October
24-26, 2007). IMC '07. ACM, New York, 29-42.
Search WWH ::




Custom Search