標題: Titlebook: Computational Data and Social Networks; 11th International C Thang N. Dinh,Minming Li Conference proceedings 2023 The Editor(s) (if applica [打印本頁] 作者: invoke 時間: 2025-3-21 19:58
書目名稱Computational Data and Social Networks影響因子(影響力)
書目名稱Computational Data and Social Networks影響因子(影響力)學科排名
書目名稱Computational Data and Social Networks網(wǎng)絡公開度
書目名稱Computational Data and Social Networks網(wǎng)絡公開度學科排名
書目名稱Computational Data and Social Networks被引頻次
書目名稱Computational Data and Social Networks被引頻次學科排名
書目名稱Computational Data and Social Networks年度引用
書目名稱Computational Data and Social Networks年度引用學科排名
書目名稱Computational Data and Social Networks讀者反饋
書目名稱Computational Data and Social Networks讀者反饋學科排名
作者: Albinism 時間: 2025-3-21 20:59 作者: 狂熱語言 時間: 2025-3-22 03:20 作者: OREX 時間: 2025-3-22 07:59
We will fight them on the Beachesstance for group recommendation system. The proposed recommendation model is evaluated on the Jester5k and the MovieLens datasets. The experiment result shows the feasibility of applying the potential energy for the group recommendation problems.作者: 語源學 時間: 2025-3-22 10:07
Carl Friedrich Graumann,Margret Wintermantelrotocol. An evaluation of the implementation is also conducted. Experimental results show that the cost of transactions decreases depending on the batch size, with the gas cost decreasing by more than 85% for a batch size of 50 transactions. Other evaluation results reveal that deposits incur the most cost and increase faster with the batch size.作者: 迫擊炮 時間: 2025-3-22 14:24
0302-9743 held as a Virtual Event, during December 5–7, 2022.?The 17 full papers and 7 short papers included in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows:?Machine Learning and Prediction,?Security and Blockchain,?Fact-checking, Fake 作者: 迫擊炮 時間: 2025-3-22 19:03 作者: 投票 時間: 2025-3-23 00:52
We will fight them on the Beachesand the word alignment process’s performance, so the proposed strategy can be extended and applied to another low-resource language as long as there is a large bilingual corpus with a rich resource language.作者: Crumple 時間: 2025-3-23 05:11
https://doi.org/10.1007/978-1-4612-3582-8 Results show that the degree-based attack on the global component is more effective than the classical attack on the entire network. In contrast, the classical Betweenness attack slightly outperforms the Betweenness attack on the global component. However, the latter is more efficient.作者: 不法行為 時間: 2025-3-23 05:49
Incorporating Neighborhood Information and?Sentence Embedding Similarity into?a?Repost Prediction Mothe-art machine learning methods, e.g., Logistic Regression, K-nearest Neighbors, Gaussian Naive Bayes, Deep Neural Network, Random Forest, XGBoosting and Stacking Model to predict repost probability. We evaluate our model on real dataset Weibo to compare the performance with different features and machine learning methods.作者: 修改 時間: 2025-3-23 10:01 作者: 尖 時間: 2025-3-23 14:51
Targeted Attack of?the?Air Transportation Network Global Component Results show that the degree-based attack on the global component is more effective than the classical attack on the entire network. In contrast, the classical Betweenness attack slightly outperforms the Betweenness attack on the global component. However, the latter is more efficient.作者: Estrogen 時間: 2025-3-23 20:13
Conference proceedings 2023Virtual Event, during December 5–7, 2022.?The 17 full papers and 7 short papers included in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows:?Machine Learning and Prediction,?Security and Blockchain,?Fact-checking, Fake News, and 作者: BARGE 時間: 2025-3-24 00:43
We will fight them on the Beachesve experiments are conducted on thirteen real networks originating from diverse domains. The experimental results indicate that the proposed index improves the prediction accuracy measured by AUC and has achieved a competitive result on Precision compared to the existing state-of-the-art link prediction methods.作者: thrombus 時間: 2025-3-24 05:26 作者: 吊胃口 時間: 2025-3-24 07:06 作者: 共和國 時間: 2025-3-24 11:32 作者: Graphite 時間: 2025-3-24 17:18
Link Prediction of?Complex Networks Based on?Local Path and?Closeness Centralityve experiments are conducted on thirteen real networks originating from diverse domains. The experimental results indicate that the proposed index improves the prediction accuracy measured by AUC and has achieved a competitive result on Precision compared to the existing state-of-the-art link prediction methods.作者: exhilaration 時間: 2025-3-24 21:52 作者: 卷發(fā) 時間: 2025-3-25 01:38
Do Content Management Systems Impact the?Security of?Free Content Websites? Moreover, we find that, despite the significant number of custom code websites, the use of CMS’s is pervasive, with varying trends across types and categories. Finally, we find that even a small number of unpatched vulnerabilities in popular CMS’s could be a potential cause for significant maliciousness.作者: 教義 時間: 2025-3-25 04:16 作者: 美麗的寫 時間: 2025-3-25 07:37 作者: 真繁榮 時間: 2025-3-25 14:12 作者: 叫喊 時間: 2025-3-25 18:17
Analyzing Scientometric Indicators of?Journals and?Chief Editors: A Case Study in?Artificial IntelliL) classifiers can predict the SJR and IF of journals utilizing EIC’s scholarly reputation metrics. It is observed that the comparative rankings (based on various metrics) of top AI journals do not correlate with the EiC’s scholarly achievements. The high prediction errors of ML classifiers indicate作者: 毛細血管 時間: 2025-3-25 20:55 作者: phlegm 時間: 2025-3-26 01:00 作者: 流出 時間: 2025-3-26 06:49
BNnetXtreme: An Enhanced Methodology for?Bangla Fake News Detection Onlinee news detection introduced previously. The BNnetXtreme especially BERT Bangla base model performed with an accuracy score of 91% and an AUC score of 98%. Our proposed BNnetXtreme has been successful in improving the performance by an increase of 1.1% in accuracy score, 5.6% in precision, 1.1% in F1作者: Parabola 時間: 2025-3-26 11:51 作者: 攀登 時間: 2025-3-26 13:17 作者: bleach 時間: 2025-3-26 19:57
Stereotypes and National Identity in Euro 96 that pro-Russia memes fall into thematic categories that seek to undermine specific elements of US and their allies’ policy and culture. Pro-Ukraine memes are far more diffuse thematically, highlighting admiration for Ukraine’s people and its leadership. Stakeholders may utilize our findings to dev作者: Condescending 時間: 2025-3-26 23:06
https://doi.org/10.1057/9781403919465L) classifiers can predict the SJR and IF of journals utilizing EIC’s scholarly reputation metrics. It is observed that the comparative rankings (based on various metrics) of top AI journals do not correlate with the EiC’s scholarly achievements. The high prediction errors of ML classifiers indicate作者: Outshine 時間: 2025-3-27 02:13
Stereotypes, Language and the Media: ,?the largest number of subtheories was born. For this day it is taken as the base for teaching artists. We utilize novel dataset of 3,885 paintings collected from Christie’s and Sotheby’s and find that color harmony has a little explanatory power, color complexity metrics are impact price negatively 作者: 令人作嘔 時間: 2025-3-27 05:41 作者: temperate 時間: 2025-3-27 12:29 作者: 工作 時間: 2025-3-27 16:39
V. Austel,A. T. Balaban,I. Motocwas annotated in two ways; either it condemned or condoned anti-Asian bias, and whether it was offensive or non-offensive. A rich set of features both from the text and accompanying numerical data were extracted. These features were used to train conventional machine learning and deep learning model作者: 親愛 時間: 2025-3-27 20:04
Incorporating Neighborhood Information and?Sentence Embedding Similarity into?a?Repost Prediction Mong. Traditional methods for repost prediction can be categorized into stochastic diffusion based models and user profile or content features based machine learning models. In this paper, we propose a new framework combining user profile, content similarity and the neighborhood information around eac作者: 移植 時間: 2025-3-28 00:40
Driving Factors of?Polarization on?Twitter During Protests Against COVID-19 Mitigation Measures in?Vinfections in Austria (particularly in Vienna). We focus on predicting users’ protest activity by leveraging machine learning methods and individual driving factors such as language features of users supporting/opposing Corona protests. For evaluation of our methods we utilize novel datasets, collec作者: 不溶解 時間: 2025-3-28 02:46
Categorizing Memes About the?Ukraine Conflict critical for governments and similar stakeholders to identify pro-Russia memes, countering them with evidence-based information. Identifying broad meme themes is crucial for developing a targeted and strategic counter response. There are also a range of pro-Ukraine memes that bolster support for th作者: 地名表 時間: 2025-3-28 09:10
Analyzing Scientometric Indicators of?Journals and?Chief Editors: A Case Study in?Artificial Intelli mining various scientometric data. The associations between these two types of entities are studied with respect to the top AI journals (selected based on Google Scholar ranking) and journals from various quartiles (based on Scimago quartile ranking). Three quantitative reputation metrics (i.e., ci作者: faction 時間: 2025-3-28 14:30 作者: aristocracy 時間: 2025-3-28 16:56
The Influence of?Color on?Prices of?Abstract Paintings a painting have on its price. We construct a number of visual features in CIELAB color space measuring complexity of the painting, its points of interest using Discrete symmetry transform, segmentation-based features using Felzenszwalb segmentation and Regions adjacency graph merging, local color f作者: 上流社會 時間: 2025-3-28 18:58 作者: Jacket 時間: 2025-3-29 02:39
Knowledge Transfer via?Word Alignment and?Its Application to?Vietnamese POS Tagging Vietnamese. Due to the development and investment in research, there is no large and high-accuracy annotated corpus. This paper proposes a transfer learning strategy to build a high-quality tagger for Vietnamese using a bilingual corpus Vietnamese-English. Particularly, We inherit the strength of a作者: Gleason-score 時間: 2025-3-29 03:43 作者: Relinquish 時間: 2025-3-29 08:27 作者: choroid 時間: 2025-3-29 12:11
Targeted Attack of?the?Air Transportation Network Global Componentven centrality measure. Although most real-world networks exhibit a mesoscopic structure, strategies proposed in the literature do not exploit this ubiquitous property. We introduce an attack strategy based on the network component structure to overcome these drawbacks. The component structure of a 作者: 狂怒 時間: 2025-3-29 16:43
Measuring Cryptocurrency Mining in?Public Cloud Services: A Security Perspectivety in cryptocurrencies is “mining pools”, groups of cooperating cryptocurrency miners who agree to share block rewards in proportion to their contributed mining hash power. Despite the many promised benefits of cryptocurrencies, they are equally utilized for malicious activities, e.g., ransomware pa作者: 改革運動 時間: 2025-3-29 22:28
Do Content Management Systems Impact the?Security of?Free Content Websites?1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizing the unpatched vulnerabilities, total vulnerabil作者: Metastasis 時間: 2025-3-30 02:53
BNnetXtreme: An Enhanced Methodology for?Bangla Fake News Detection Onlineas there have been significant events in various cities due to unjustifiable rumors. But the overall progress in study and innovation in the detection of Bangla fake and misleading news is still not adequate in light of the prospects for policymakers in Bangladesh. In this study, an enhanced methodo作者: 很像弓] 時間: 2025-3-30 07:37
Heuristic Gradient Optimization Approach to?Controlling Susceptibility to?Manipulation in?Online Soceir interactions with the network. Since some users have a higher propensity for disclosure than others, a one-size-fits-all technique for limiting manipulation proves insufficient. In this work, we propose a model that allows the user to adjust their online persona to limit their susceptibility to 作者: 高興去去 時間: 2025-3-30 08:40
Identifying Targeted and?Generalized Offensive Speech from?Anti-asian Social Media Conversationsondemning this jaundiced attitude. Ironically, however, the dialogue on both sides is filled with offensive and abusive language. While abusive language directed at Asians encourages violence and hate crimes against this ethnic group, the use of derogatory language to insult alternative points of vi作者: reaching 時間: 2025-3-30 13:57 作者: 變化無常 時間: 2025-3-30 20:27 作者: 水汽 時間: 2025-3-30 21:23 作者: infantile 時間: 2025-3-31 03:45 作者: 彩色的蠟筆 時間: 2025-3-31 08:48 作者: 有發(fā)明天才 時間: 2025-3-31 12:08
https://doi.org/10.1007/978-3-319-40676-3ng. Traditional methods for repost prediction can be categorized into stochastic diffusion based models and user profile or content features based machine learning models. In this paper, we propose a new framework combining user profile, content similarity and the neighborhood information around eac作者: 審問 時間: 2025-3-31 15:49