Description
Article 34Improved KNN-Based Efficient Log Anomaly Detection Method with Automatically Labeled Samples
(S. Ying, B. Wang, L. Wang, Q. Li, Y. Zhao, J. Shang, H. Huang, G. Cheng, Z. Yang, and J. Geng)
Article 35
Predicting Influential Users in Online Social Network Groups
(A. De Salve, P. Mori, B. Guidi, L. Ricci, and R. Di Pietro)
Article 36
Understanding Persuasion Cascades in Online Product Rating Systems: Modeling, Analysis, and Inference (H. Xie, M. Zhong, Y. Li, and J. C. S. Lui)
Article 37
Probability Ordinal-Preserving Semantic Hashing for Large-Scale Image Retrieval
(Z. Zhang, X. Zhu, G. Lu, and Y. Zhang)
Article 38
CoCoS: Fast and Accurate Distributed Triangle Counting in Graph Streams
(K. Shin, E. Lee, J. Oh, M. Hammoud, and C. Faloutsos)
Article 39
Multi-View Collaborative Network Embedding
(S. K. Ata, Y. Fang, M. Wu, J. Shi, C. K. Kwoh, and X. Li)
ISBN:KNOWLEDGEDISC