![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 9 of 9 matches in All Departments
The three volume set provides a systematic overview of theories and technique on social network analysis.Volume 2 of the set mainly focuses on the formation and interaction of group behaviors. Users' behavior analysis, sentiment analysis, influence analysis and collective aggregation are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.
The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 1 of the set mainly focuses on the structure characteristics, the modeling, and the evolution mechanism of social network analysis. Techniques and approaches for virtual community detection are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.
The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 3 of the set mainly focuses on the propagation models and evolution rules of information. Information retrieval and dissemination, topic discovery and evolution, algorithms of influence maximization are discussed in detail. It is an essential reference for scientist and professionals in computer science.
The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 1 of the set mainly focuses on the structure characteristics, the modeling, and the evolution mechanism of social network analysis. Techniques and approaches for virtual community detection are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.
The three volume set provides a systematic overview of theories and technique on social network analysis.Volume 2 of the set mainly focuses on the formation and interaction of group behaviors. Users' behavior analysis, sentiment analysis, influence analysis and collective aggregation are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.
The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 3 of the set mainly focuses on the propagation models and evolution rules of information. Information retrieval and dissemination, topic discovery and evolution, algorithms of influence maximization are discussed in detail. It is an essential reference for scientist and professionals in computer science.
This book constitutes the refereed proceedings of the 16th Asia-Pacific Conference APWeb 2014 held in Changsha, China, in September 2014. The 34 full papers and 23 short papers presented were carefully reviewed and selected from 134 submissions. The papers address research, development and advanced applications of large-scale data management, web and search technologies, and information processing.
Knowledge representation is an important task in understanding how humans think and learn. Although many representation models or cognitive models have been proposed, such as expert systems or knowledge graphs, they cannot represent procedural knowledge, i.e., dynamic knowledge, in an efficient way.This book introduces a new knowledge representation model called MDATA (Multi-dimensional Data Association and inTelligent Analysis). By modifying the representation of entities and relations in knowledge graphs, dynamic knowledge can be efficiently described with temporal and spatial characteristics. The MDATA model can be regarded as a high-level temporal and spatial knowledge graph model, which has strong capabilities for knowledge representation. This book introduces some key technologies in the MDATA model, such as entity recognition, relation extraction, entity alignment, and knowledge reasoning with spatiotemporal factors. The MDATA model can be applied in many critical applications and this book introduces some typical examples, such as network attack detection, social network analysis, and epidemic assessment. The MDATA model should be of interest to readers from many research fields, such as database, cyberspace security, and social network, as the need for the knowledge representation arises naturally in many practical scenarios.
|
You may like...
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
|