UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 525
1.
Celotno besedilo

PDF
2.
Celotno besedilo
3.
Celotno besedilo

PDF
4.
  • Anomaly detection in online... Anomaly detection in online social networks
    Savage, David; Zhang, Xiuzhen; Yu, Xinghuo ... Social networks, 10/2014, Letnik: 39
    Journal Article
    Recenzirano
    Odprti dostop

    Display omitted •We review current approaches to detecting anomalies in social networks.•We identify key attributes of anomalies and use these to categorise detection methods.•We generalise the ...
Celotno besedilo

PDF
5.
  • VISO approach: A socializat... VISO approach: A socialization proposal for the Internet of Things objects
    Camargo, L.S.; Pauletti, J.F.; Pernas, A.M. ... Future generation computer systems, January 2024, 2024-01-00, Letnik: 150
    Journal Article
    Recenzirano

    Amidst the ongoing technological expansion, IoT-based applications have established their presence in various scenarios, including smart homes, healthcare, wearable devices, and more. However, ...
Celotno besedilo
6.
Celotno besedilo
7.
  • Link-based approach to stud... Link-based approach to study scientific software usage: the case of VOSviewer
    Orduña-Malea, Enrique; Costas, Rodrigo Scientometrics, 09/2021, Letnik: 126, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Scientific software is a fundamental player in modern science, participating in all stages of scientific knowledge production. Software occasionally supports the development of trivial tasks, while ...
Celotno besedilo

PDF
8.
  • Anti-Money Laundering: Usin... Anti-Money Laundering: Using data visualization to identify suspicious activity
    Singh, Kishore; Best, Peter International journal of accounting information systems, September 2019, 2019-09-00, Letnik: 34
    Journal Article
    Recenzirano

    Annually, money laundering activities threaten the global economy. Proceeds of these activities may be used to fund further criminal activities and to undermine the integrity of financial systems ...
Celotno besedilo
9.
  • Randomized shortest paths w... Randomized shortest paths with net flows and capacity constraints
    Courtain, Sylvain; Leleux, Pierre; Kivimäki, Ilkka ... Information sciences, 20/May , Letnik: 556
    Journal Article
    Recenzirano
    Odprti dostop

    This work extends the randomized shortest paths (RSP) model by investigating the net flow RSP and adding capacity constraints on edge flows. The standard RSP is a model of movement, or spread, ...
Celotno besedilo

PDF
10.
  • Topic oriented community de... Topic oriented community detection through social objects and link analysis in social networks
    Zhao, Zhongying; Feng, Shengzhong; Wang, Qiang ... Knowledge-based systems, 02/2012, Letnik: 26
    Journal Article
    Recenzirano
    Odprti dostop

    Community detection is an important issue in social network analysis. Most existing methods detect communities through analyzing the linkage of the network. The drawback is that each community ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 525

Nalaganje filtrov