Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Graph summarization methods and applications: A survey
While advances in computing resources have made processing enormous amounts of data
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …
Evolutionary network analysis: A survey
Evolutionary network analysis has found an increasing interest in the literature because of
the importance of different kinds of dynamic social networks, email networks, biological …
the importance of different kinds of dynamic social networks, email networks, biological …
[SÁCH][B] An introduction to outlier analysis
CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …
mining and statistics literature. In most applications, the data is created by one or more …
Back to the app: the costs of mobile application interruptions
Smartphone users might be interrupted while interacting with an application, either by
intended or unintended circumstances. In this paper, we report on a large-scale …
intended or unintended circumstances. In this paper, we report on a large-scale …
[PDF][PDF] Algorithms for graph similarity and subgraph matching
We deal with two independent but related problems, those of graph similarity and subgraph
matching, which are both important practical problems useful in several fields of science …
matching, which are both important practical problems useful in several fields of science …
Mining mobility user profiles for car pooling
In this paper we introduce a methodology for extracting mobility profiles of individuals from
raw digital traces (in particular, GPS traces), and study criteria to match individuals based on …
raw digital traces (in particular, GPS traces), and study criteria to match individuals based on …
Com2: fast automatic discovery of temporal ('comet') communities
Given a large network, changing over time, how can we find patterns and anomalies? We
propose Com2, a novel and fast, incremental tensor analysis approach, which can discover …
propose Com2, a novel and fast, incremental tensor analysis approach, which can discover …
Edgecentric: Anomaly detection in edge-attributed networks
Given a network with attributed edges, how can we identify anomalous behavior? Networks
with edge attributes are ubiquitous, and capture rich information about interactions between …
with edge attributes are ubiquitous, and capture rich information about interactions between …
From metaphor to method: Cartographic perspectives on information visualization
A Skupin - IEEE Symposium on Information Visualization 2000 …, 2000 - ieeexplore.ieee.org
By virtue of their spatio-cognitive abilities, humans are able to navigate through geographic
space as well as meaningfully communicate geographic information represented in …
space as well as meaningfully communicate geographic information represented in …
An AI-empowered framework for cross-layer softwarized infrastructure state assessment
Network softwarization technologies challenge legacy fault management systems.
Coordination and dependency among different novel software components for orchestration …
Coordination and dependency among different novel software components for orchestration …