Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Information Systems (H) > Information Storage And Retrieval (H.3) > Systems And Software (H.3.4) > Information Networks (H.3.4...)  
  1-10 of 91 Reviews about "Information Networks (H.3.4...)": Date Reviewed
  Reducing uncertainty of dynamic heterogeneous information networks: a fusing reconstructing approach
Yang N., He L., Li Z., Yu P.  Data Mining and Knowledge Discovery 31(3): 879-906, 2017. Type: Article

A detailed technical account, this paper presents a new method of handling heterogeneous information network analysis....

Aug 8 2017
  Beyond entities: promoting explorative search with bundles
Bordino I., Lalmas M., Mejova Y., Van Laere O.  Information Retrieval 19(5): 447-486, 2016. Type: Article

Search results are usually ranked lists of documents relevant to query terms. In this paper, the entity search results are bundled with those beyond the query term, by constructing the entity network where extracted entities and pairwise entity re...

Jan 25 2017
  Social question answering: textual, user, and network features for best answer prediction
Molino P., Aiello L., Lops P.  ACM Transactions on Information Systems 35(1): 1-40, 2016. Type: Article

This paper combines a good review of the main techniques used in community question-answering (CQA) systems with an extensive and systematic study that compares the effect of using different sets of features for the task of predicting the best ans...

Nov 11 2016
  Spy vs. spy: rumor source obfuscation
Fanti G., Kairouz P., Oh S., Viswanath P.  SIGMETRICS 2015 (Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Portland, OR,  Jun 15-19, 2015) 271-284, 2015. Type: Proceedings

Social media platforms for anonymous messaging allow users to express their thoughts without judgment from others. Such is particularly important in authoritarian environments where free expression requires anonymity. This paper looks at an advers...

Nov 11 2016
  Refining social graph connectivity via shortcut edge addition
Papagelis M.  ACM Transactions on Knowledge Discovery from Data 10(2): 1-35, 2015. Type: Article

Small changes to the structure of graphs imply a huge impact on their connectivity. While in a purely theoretical approach, a topological change affects just formal properties, graph data structures associated with well-defined semantics (for exam...

Dec 14 2015
  Visualising a knowledge mapping of information systems investment evaluation
Irani Z., Sharif A., Kamal M., Love P.  Expert Systems with Applications: An International Journal 41(1): 105-125, 2014. Type: Article

Information systems (IS) typically represent a considerable investment for organizations. Failure to properly evaluate an investment in IS can pose risks to organizations, ranging from loss of potential productivity gains to excessive costs. One g...

Sep 25 2014
  Mobile CEP architecture: from intelligent sensing to collaborative monitoring
Stojanovic N., Xu Y., Nissatech B., Stojanovic L.  DEBS 2014 (Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, Mumbai, India,  May 26-29, 2014) 350-353, 2014. Type: Proceedings

This paper proposes a mobile complex event processing (CEP) architecture for collaborative personal monitoring. The proposed architecture is designed by combining machine learning, distributed intelligence, efficient communication, and hybrid stor...

Jul 30 2014
  Organize, socialize, benefit: how social media applications impact enterprise success and performance
Lehner F., Fteimi N.  i-KNOW 2013 (Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, Graz, Austria,  Sep 4-6, 2013) 1-8, 2013. Type: Proceedings

This literature review reports on the usefulness of social media to individual users, teams of users, and organizations. The authors examine 17 “selected scientific studies,” most of which were reported since 2008. (The total number of...

Dec 19 2013
  Digital forensics for enterprise rights management systems
Schrittwieser S., Kieseberg P., Weippl E.  IIWAS 2012 (Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali, Indonesia,  Dec 3-5, 2012) 111-120, 2012. Type: Proceedings

Enterprise rights management (ERM) is concerned with managing and protecting data in an enterprise context. Digital forensics issues run into considerations of encryption and access protection. Existing guidelines and standards, such as National I...

May 16 2013
  On the way to the web: the secret history of the Internet and its founders
Banks M.,  Apress, Berkeley, CA, 2012. 236 pp. Type: Book (978-1-430250-74-6)

There are two paths to the Internet we use today. The first began as ARPANET, a US government-sponsored network originally commissioned to facilitate defense communications, motivated in part by the Soviet Union’s 1957 launch of Sputnik that...

Jan 31 2013
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy