default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2013
- Jinpeng Chen, Yu Liu, Jun Hu, Wei He, Deyi Li:
A Novel Framework for Improving Recommender Diversity. BSI@PAKDD/BSIC@IJCAI 2013: 129-138 - Qiao Deng, Zhoujun Li, Xiaoming Zhang, Jiali Xia:
Interaction-Based Social Relationship Type Identification in Microblog. BSI@PAKDD/BSIC@IJCAI 2013: 151-164 - Yanhui Gu, Zhenglu Yang, Miyuki Nakano, Masaru Kitsuregawa:
Exploration on Similar Spatial Textual Objects Retrieval. BSI@PAKDD/BSIC@IJCAI 2013: 237-249 - Xiancheng Hou, Bing Shi, Wenjia Niu, Qi Feng, Ying Qi:
An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network. BSI@PAKDD/BSIC@IJCAI 2013: 204-213 - Yuting Hu, Rong Xie, Wenjun Zhang:
Network Flow Based Collective Behavior Analysis. BSI@PAKDD/BSIC@IJCAI 2013: 10-19 - Mingwei Leng, Weiming Lv, Jianjun Cheng, Zhao Li, Xiaoyun Chen:
Cooperative Community Detection Algorithm Based on Random Walks. BSI@PAKDD/BSIC@IJCAI 2013: 191-203 - Peng Li, Ling Chen, Xue Li, Junhao Wen:
RNRank: Network-Based Ranking on Relational Tuples. BSI@PAKDD/BSIC@IJCAI 2013: 139-150 - Lin Li, Xing Chen, Guandong Xu:
Suggestions for Fresh Search Queries by Mining Mircoblog Topics. BSI@PAKDD/BSIC@IJCAI 2013: 214-223 - Quanchao Liu, Heyan Huang, Chong Feng:
Micro-blog Post Topic Drift Detection Based on LDA Model. BSI@PAKDD/BSIC@IJCAI 2013: 106-118 - Xuefeng Ma, Bo Li, Qi An:
A Network-Based Approach for Collaborative Filtering Recommendation. BSI@PAKDD/BSIC@IJCAI 2013: 119-128 - Zhixin Ma, Xu Yusheng, Tharam S. Dillon:
Mining Frequent Sequences Using Itemset-Based Extension. BSI@PAKDD/BSIC@IJCAI 2013: 1-9 - Benke Qu, Wenjia Niu, Tianqing Zhu, Lei Wu, Shijun Liu, Na Wang:
Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks. BSI@PAKDD/BSIC@IJCAI 2013: 44-55 - Juyup Sung, Seunghyeon Moon, Jae-Gil Lee:
The Influence in Twitter: Are They Really Influenced? BSI@PAKDD/BSIC@IJCAI 2013: 95-105 - Xuri Tang, Weiguang Qu, Xiaohe Chen:
Semantic Change Computation: A Successive Approach. BSI@PAKDD/BSIC@IJCAI 2013: 68-81 - Qingmai Wang, Xinghuo Yu, Xiuzhen Zhang:
A Connectionist Model-Based Approach to Centrality Discovery in Social Networks. BSI@PAKDD/BSIC@IJCAI 2013: 82-94 - Rong Xie, Huizheng Xu, Yang Yue:
Using Mobile Phone Location Data for Urban Activity Analysis. BSI@PAKDD/BSIC@IJCAI 2013: 30-43 - Hongteng Xu, Dixin Luo, Xiaoming Huo, Xiaokang Yang:
World Expo Problem and Its Mixed Integer Programming Based Solution. BSI@PAKDD/BSIC@IJCAI 2013: 56-67 - Shunichi Yokoo, Noriaki Yoshiura:
Indicating Important Parts in Searched Web Pages by Retrieval Keywords. BSI@PAKDD/BSIC@IJCAI 2013: 250-263 - Yuqi Zhang, Jian Cao:
Personalized Recommendation Based on Behavior Sequence Similarity Measures. BSI@PAKDD/BSIC@IJCAI 2013: 165-177 - Xin Zhang, Ben He, Tiejian Luo:
Learn to Rank Tweets by Integrating Query-Specific Characteristics. BSI@PAKDD/BSIC@IJCAI 2013: 224-236 - Bin Zhao, Genlin Ji, Weiguang Qu, Zhigang Zhang:
Detecting Spam Community Using Retweeting Relationships - A Study on Sina Microblog. BSI@PAKDD/BSIC@IJCAI 2013: 178-190 - Cong Zhao, Guangzhong Sun, Ye Tian:
Design, Conduct and Analysis of a Biased Voting Experiment on Human Behavior. BSI@PAKDD/BSIC@IJCAI 2013: 20-29 - Longbing Cao, Hiroshi Motoda, Jaideep Srivastava, Ee-Peng Lim, Irwin King, Philip S. Yu, Wolfgang Nejdl, Guandong Xu, Gang Li, Ya Zhang:
Behavior and Social Computing, International Workshop on Behavior and Social Informatics, BSI 2013, Gold Coast, QLD, Australia, April 14-17, 2013 and International Workshop on Behavior and Social Informatics and Computing, BSIC 2013, Beijing, China, August 3-9, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8178, Springer 2013, ISBN 978-3-319-04047-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-11 02:27 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint