Nome |
# |
Applying Artificial Intelligence in Healthcare Social Networks to Identity Critical Issues in Patients’ Posts, file de3e52b1-32b5-762d-e053-3705fe0a30e0
|
28
|
Adaptive Search over Sorted Sets, file de3e52ae-e9eb-762d-e053-3705fe0a30e0
|
16
|
Adaptive Search over Sorted Sets, file de3e52ae-e9ec-762d-e053-3705fe0a30e0
|
14
|
A machine learning-based approach for predicting the outbreak of cardiovascular diseases in patients on dialysis, file de3e52b2-1d74-762d-e053-3705fe0a30e0
|
11
|
An empirical comparison of algorithms to find communities in directed graphs and their application in Web Data Analytics, file de3e52b1-1b00-762d-e053-3705fe0a30e0
|
9
|
Network structure and resilience of Mafia syndicates, file de3e52b3-6f7d-762d-e053-3705fe0a30e0
|
9
|
Artificial neural networks training acceleration through network science strategies, file de3e52b4-c0b0-762d-e053-3705fe0a30e0
|
9
|
Analysis of a NoSQL Graph DBMS for a Hospital Social Network, file de3e52b1-b98e-762d-e053-3705fe0a30e0
|
8
|
Artificial neural networks training acceleration through network science strategies, file de3e52b3-87aa-762d-e053-3705fe0a30e0
|
8
|
A Lightweight Architecture for RSS Polling of Arbitrary Web sources, file de3e52ae-c647-762d-e053-3705fe0a30e0
|
7
|
Resilience in criminal networks, file de3e52b0-be9a-762d-e053-3705fe0a30e0
|
7
|
Rule-Based Spam E-mail Annotation, file de3e52b1-8052-762d-e053-3705fe0a30e0
|
4
|
null, file de3e52b5-4985-762d-e053-3705fe0a30e0
|
4
|
Simple Physics with Python: a workbook on introductory Physics with open source software , file 02b118f6-2283-4177-abbd-755a0e827ae7
|
3
|
A Novel Measure of Edge Centrality in Social Networks, file de3e52ae-d158-762d-e053-3705fe0a30e0
|
3
|
Metodo per l'analisi predittiva della struttura sociale di organizzazioni criminali, file de3e52b2-592d-762d-e053-3705fe0a30e0
|
3
|
Disrupting resilient criminal networks through data analysis: The case of sicilian mafia, file de3e52b3-ac0a-762d-e053-3705fe0a30e0
|
3
|
Simple Physics with Python: a workbook on introductory Physics with open source software , file 7be74bfa-9606-4cb5-9aff-e99a475bdd65
|
2
|
Covert Network Construction, Disruption, and Resilience: A Survey, file b26c555c-efbf-4de5-82e6-191c9c9b5c8c
|
2
|
null, file de3e52ae-beb9-762d-e053-3705fe0a30e0
|
2
|
Rule-based Spam E-mail Annotation, file de3e52ae-c374-762d-e053-3705fe0a30e0
|
2
|
A rule-based system for end-user e-mail annotations, file de3e52ae-d648-762d-e053-3705fe0a30e0
|
2
|
Mixing local and global information for community detection in large networks, file de3e52ae-e292-762d-e053-3705fe0a30e0
|
2
|
Enhancing community detection using a network weighting strategy, file de3e52ae-e6e6-762d-e053-3705fe0a30e0
|
2
|
Web data extraction, applications and techniques: A survey, file de3e52af-0739-762d-e053-3705fe0a30e0
|
2
|
Investigating classification supervised learning approaches for the identification of critical patients’ posts in a healthcare social network, file de3e52b2-6d37-762d-e053-3705fe0a30e0
|
2
|
null, file de3e52b3-5b9a-762d-e053-3705fe0a30e0
|
2
|
Robust link prediction in criminal networks: A case study of the Sicilian Mafia, file de3e52b3-9e19-762d-e053-3705fe0a30e0
|
2
|
Multilayer Network Analysis: The Identification of Key Actors in a Sicilian Mafia Operation, file de3e52b5-4756-762d-e053-3705fe0a30e0
|
2
|
Criminal networks analysis in missing data scenarios through graph distances, file de3e52b5-475c-762d-e053-3705fe0a30e0
|
2
|
Correlation Analysis of Node and Edge Centrality Measures in Artificial Complex Networks, file 5b5cb273-143d-4451-b098-e23402a82756
|
1
|
Extraction and Analysis of Facebook Friendship Relations, file de3e52ae-d04f-762d-e053-3705fe0a30e0
|
1
|
On Facebook, most ties are weak, file de3e52af-06c9-762d-e053-3705fe0a30e0
|
1
|
Detecting criminal organizations in mobile phone networks, file de3e52af-0738-762d-e053-3705fe0a30e0
|
1
|
Visualizing criminal networks reconstructed from mobile phone records, file de3e52af-88af-762d-e053-3705fe0a30e0
|
1
|
Brownian Dynamics Simulation of Diffusion Controlled Reactions. A Parallel Approach Using PVM on a RISC-Cluster, file de3e52b0-c4bb-762d-e053-3705fe0a30e0
|
1
|
The effective colloid interaction in the Asakura–Oosawa model. Assessment of non-pairwise terms from the virial expansion, file de3e52b0-f30e-762d-e053-3705fe0a30e0
|
1
|
Virial coefficients and demixing in the Asakura-Oosawa model, file de3e52b0-f667-762d-e053-3705fe0a30e0
|
1
|
Virial coefficients, equation of state, and demixing of binary asymmetric nonadditive hard-disk mixtures, file de3e52b3-6cb6-762d-e053-3705fe0a30e0
|
1
|
Input Selection Methods for Soft Sensor Design: A Survey, file de3e52b3-6cf1-762d-e053-3705fe0a30e0
|
1
|
Social Network Analysis of Sicilian Mafia Interconnections, file de3e52b4-08aa-762d-e053-3705fe0a30e0
|
1
|
Studying Physics, Getting to Know Python: RC Circuit, Simple Experiments, Coding, and Data Analysis with Raspberry Pi, file de3e52b5-1d2d-762d-e053-3705fe0a30e0
|
1
|
Transients in electric circuits with Raspberry Pi and Python, file de3e52b5-2d50-762d-e053-3705fe0a30e0
|
1
|
Graph and Network Theory for the Analysis of Criminal Networks, file de3e52b5-364b-762d-e053-3705fe0a30e0
|
1
|
Correlations Among Game of Thieves and Other Centrality Measures in Complex Networks, file de3e52b5-4758-762d-e053-3705fe0a30e0
|
1
|
Totale |
187 |