Nome |
# |
Artificial neural networks training acceleration through network science strategies, file de3e52b4-c0b0-762d-e053-3705fe0a30e0
|
20
|
Artificial neural networks training acceleration through network science strategies, file de3e52b3-87aa-762d-e053-3705fe0a30e0
|
19
|
Using Centrality Measures to Predict Helpfulness-Based Reputation in Trust Networks, file de3e52b0-b606-762d-e053-3705fe0a30e0
|
13
|
Resilience in criminal networks, file de3e52b0-be9a-762d-e053-3705fe0a30e0
|
13
|
Disrupting resilient criminal networks through data analysis: The case of sicilian mafia, file de3e52b3-ac0a-762d-e053-3705fe0a30e0
|
13
|
A General Centrality Framework-Based on Node Navigability, file c9ea6d0b-ffc2-41be-aa20-22c3f09a0a0c
|
11
|
Trust and Compactness in Social Network Groups, file de3e52af-5537-762d-e053-3705fe0a30e0
|
11
|
A machine learning-based approach for predicting the outbreak of cardiovascular diseases in patients on dialysis, file de3e52b2-1d74-762d-e053-3705fe0a30e0
|
11
|
null, file de3e52b0-b524-762d-e053-3705fe0a30e0
|
10
|
null, file de3e52b0-b81e-762d-e053-3705fe0a30e0
|
10
|
Combining trust and skills evaluation to form e-Learning classes in online social networks, file de3e52b0-cf4c-762d-e053-3705fe0a30e0
|
9
|
An empirical comparison of algorithms to find communities in directed graphs and their application in Web Data Analytics, file de3e52b1-1b00-762d-e053-3705fe0a30e0
|
9
|
null, file de3e52b2-eae5-762d-e053-3705fe0a30e0
|
9
|
Network structure and resilience of Mafia syndicates, file de3e52b3-6f7d-762d-e053-3705fe0a30e0
|
9
|
Estimating graph robustness through the randic index, file de3e52b3-6f69-762d-e053-3705fe0a30e0
|
8
|
Providing recommendations in social networks by integrating local and global reputation, file de3e52b3-592c-762d-e053-3705fe0a30e0
|
7
|
Forming time-stable homogeneous groups into Online Social Networks, file de3e52b3-6f66-762d-e053-3705fe0a30e0
|
6
|
A General Centrality Framework-Based on Node Navigability, file de3e52b3-d472-762d-e053-3705fe0a30e0
|
6
|
Analysis of a heterogeneous social network of humans and cultural objects, file de3e52ae-f2d2-762d-e053-3705fe0a30e0
|
5
|
Recommendation of similar users resources and social networks in a Social Internetworking Scenario, file de3e52af-9ec2-762d-e053-3705fe0a30e0
|
5
|
Exploring Low-degree Nodes First Accelerates Network Exploration, file de3e52b3-4a14-762d-e053-3705fe0a30e0
|
5
|
An agent-oriented, trust-aware approach to improve the QoS in dynamic grid federations, file de3e52b3-6f64-762d-e053-3705fe0a30e0
|
5
|
null, file de3e52b5-4985-762d-e053-3705fe0a30e0
|
5
|
There's No Such Thing as the Perfect Map: Quantifying Bias in Spatial Crowd-sourcing Datasets, file de3e52af-48e8-762d-e053-3705fe0a30e0
|
4
|
Branching processes reveal influential nodes in social networks, file 283207dc-afd4-4cc4-a496-bc81b3ee4a0e
|
3
|
A quantum-like approach for text generation from knowledge graphs, file 8df0b9a0-9c67-4f3f-b0ef-a95b9c7b8cb4
|
3
|
Covert Network Construction, Disruption, and Resilience: A Survey, file b26c555c-efbf-4de5-82e6-191c9c9b5c8c
|
3
|
A Novel Measure of Edge Centrality in Social Networks, file de3e52ae-d158-762d-e053-3705fe0a30e0
|
3
|
Metodo per l'analisi predittiva della struttura sociale di organizzazioni criminali, file de3e52b2-592d-762d-e053-3705fe0a30e0
|
3
|
Trust Prediction via Matrix Factorisation, file de3e52b2-7b45-762d-e053-3705fe0a30e0
|
3
|
Robust link prediction in criminal networks: A case study of the Sicilian Mafia, file de3e52b3-9e19-762d-e053-3705fe0a30e0
|
3
|
Fast and Efficient Partner Selection in Large Agents’ Communities: When Categories Overcome Direct Experience, file de3e52b3-c0ba-762d-e053-3705fe0a30e0
|
3
|
Network connectivity under a probabilistic node failure model, file de3e52b5-43e5-762d-e053-3705fe0a30e0
|
3
|
Multilayer Network Analysis: The Identification of Key Actors in a Sicilian Mafia Operation, file de3e52b5-4756-762d-e053-3705fe0a30e0
|
3
|
Criminal networks analysis in missing data scenarios through graph distances, file de3e52b5-475c-762d-e053-3705fe0a30e0
|
3
|
DFMKE: A dual fusion multi-modal knowledge graph embedding framework for entity alignment, file 125735ad-d0fc-4beb-92bd-6c127f15ffbd
|
2
|
Correlation Analysis of Node and Edge Centrality Measures in Artificial Complex Networks, file 5b5cb273-143d-4451-b098-e23402a82756
|
2
|
An adversarial training method for text classification, file 639664db-6190-4342-a259-09882f083b34
|
2
|
Link prediction approach combined graph neural network with capsule network, file 73ba99c8-8a39-4ef5-acc9-523909f398a0
|
2
|
Analyzing user behavior across social sharing environments, file de3e52ae-e234-762d-e053-3705fe0a30e0
|
2
|
Mixing local and global information for community detection in large networks, file de3e52ae-e292-762d-e053-3705fe0a30e0
|
2
|
Enhancing community detection using a network weighting strategy, file de3e52ae-e6e6-762d-e053-3705fe0a30e0
|
2
|
XML Matchers: approaches and challenges, file de3e52ae-f2d0-762d-e053-3705fe0a30e0
|
2
|
Web data extraction, applications and techniques: A survey, file de3e52af-0739-762d-e053-3705fe0a30e0
|
2
|
A reputation framework to share resources into IoT-based environments, file de3e52b1-4da7-762d-e053-3705fe0a30e0
|
2
|
null, file de3e52b2-258b-762d-e053-3705fe0a30e0
|
2
|
Social Network Analysis of Sicilian Mafia Interconnections, file de3e52b4-08aa-762d-e053-3705fe0a30e0
|
2
|
Graph and Network Theory for the Analysis of Criminal Networks, file de3e52b5-364b-762d-e053-3705fe0a30e0
|
2
|
Correlations Among Game of Thieves and Other Centrality Measures in Complex Networks, file de3e52b5-4758-762d-e053-3705fe0a30e0
|
2
|
Dynamic Community Discovery Method Based on Phylogenetic Planted Partition in Temporal Networks, file 0d5ab5d2-0c82-467a-a91b-39f2c143d0e7
|
1
|
Influential Spreaders Identification in Complex Networks With TOPSIS and K-Shell Decomposition, file 25f9480f-27f9-481c-a971-166dd536f2c0
|
1
|
Complex Network Hierarchical Sampling Method Combining Node Neighborhood Clustering Coefficient with Random Walk, file d801e2b5-e4dc-4dc2-8bb2-38cead989da1
|
1
|
Extraction and Analysis of Facebook Friendship Relations, file de3e52ae-d04f-762d-e053-3705fe0a30e0
|
1
|
Integration of the HL7 standard in a multi-agent system to support personalized access to e-health services, file de3e52ae-d950-762d-e053-3705fe0a30e0
|
1
|
How to Improve Group Homogeneity in Online Social Networks, file de3e52ae-f7b3-762d-e053-3705fe0a30e0
|
1
|
On Facebook, most ties are weak, file de3e52af-06c9-762d-e053-3705fe0a30e0
|
1
|
Detecting criminal organizations in mobile phone networks, file de3e52af-0738-762d-e053-3705fe0a30e0
|
1
|
Visualizing criminal networks reconstructed from mobile phone records, file de3e52af-88af-762d-e053-3705fe0a30e0
|
1
|
Improving the compactness in social network thematic groups by exploiting a multi-dimensional user-to-group matching algorithm, file de3e52b0-c005-762d-e053-3705fe0a30e0
|
1
|
The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks, file f2c9fe44-cf79-41d2-a592-9f756e3da99c
|
1
|
Totale |
295 |