Biblio

Found 260 results
2010
[Anonymous].  2010.  Lecture Notes in Computer Science - Applications and Theory of Petri Nets - Process Mining from a Basis of State Regions. 6128:226-245.
Goel S, Hofman JM, Lahaie S, Pennock DM, Watts DJ.  2010.  Predicting consumer behavior with Web search. Proceedings of the National academy of sciences. 107:17486–17490.
Hanslik A.  2010.  eRecruiting als zentrales Element einer modernen Personalbeschaffung. Eine Analyse fragebogengestützter Expertengespräche.
Singh V, Venkatesha S, Singh AK.  2010.  Geo-clustering of Images with Missing GeoTags. Granular Computing (GrC), 2010 IEEE International Conference on. :420-425.
Stutzman F, Kramer-Duffield J.  2010.  Friends only: examining a privacy-enhancing behavior in facebook.
Wang S, Zhang J, Liu L, Duan Z-yu.  2010.  Bike-Sharing-A new public transportation mode: State of the practice & prospects. 2010 IEEE International Conference on Emergency Management and Management Sciences (ICEMMS)2010 IEEE International Conference on Emergency Management and Management Sciences. :222-225.
Gao H, Hu J, Wilson C, Li Z.  2010.  Detecting and characterizing social spam campaigns.
Gao Y, Tang J, Hong R, Dai Q, Chua T-S, Jain R.  2010.  W2Go: A Travel Guidance System by Automatic Landmark Ranking. Proceedings of the International Conference on Multimedia. :123–132.
Clements M, Serdyukov P, de Vries AP, Reinders MJT.  2010.  Using Flickr Geotags to Predict User Travel Behaviour. Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval. :851–852.
Galuba W, Chakraborty D, Aberer K, Despotovic Z.  2010.  Outtweeting the Twitterers - Predicting Information Cascades in Microblogs. 3rd Workshop on Online Social Networks 2010.
Sakaki T, Okazaki M, Matsuo Y.  2010.  Earthquake shakes Twitter users: real-time event detection by social sensors. Proceedings of the 19th international conference on World wide web. :851–860.
Wang AH.  2010.  Don’t follow me - spam detection in twitter. SECRYPT 2010.
Liu D, Hua X-S, Wang M, Zhang H-J.  2010.  Image Retagging. Proceedings of the International Conference on Multimedia. :491–500.
Benevenuto F, Magno G, Rodrigues T, Almeida V.  2010.  Detecting spammers on twitter.
Han Y-B, Sun J-Y, Wang G-L, Li H-F.  2010.  A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data.
Shim K J, Srivastava J.  2010.  Behavioral profiles of character types in EverQuest II. Computational Intelligence and Games (CIG), 2010 IEEE Symposium on.
Fang Z, Yin C.  2010.  BPM Architecture Design Based on Cloud Computing.
Suznjevic M, Matijasevic M.  2010.  Why MMORPG players do what they do: relating motivations to action categories.
Jang YB, Kim WR, Ryu SH.  2010.  An exploratory study on avatar-self similarity, mastery experience and self-efficacy in games. ICACT'10 Proceedings of the 12th international conference on Advanced communication technology.
2009
Jakoubi S, Neubauer T, Tjoa S.  2009.  A Roadmap to Risk-Aware Business Process Management. 2009 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC).
Huberman BA, Romero DM, Wu F.  2009.  Social networks that matter: Twitter under the microscope. First Monday.
DeMaio P.  2009.  Bike-sharing: History, Impacts, Models of Provision, and Future. Journal of Public Transportation. 12(4):41-56.
Gilbert E, Karahalios K.  2009.  Predicting tie strength with social media. CHI '09 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.
[Anonymous].  2009.  Lecture Notes in Computer ScienceBusiness Process ManagementDivide-and-Conquer Strategies for Process Mining. 5701:327-343.
Russell S, Norvig P.  2009.  Artificial Intelligence: A Modern Approach.

Pages