Big data and causality

H Hassani, X Huang, M Ghodsi - Annals of Data Science, 2018 - Springer
Causality analysis continues to remain one of the fundamental research questions and the
ultimate objective for a tremendous amount of scientific studies. In line with the rapid …

Explaining causality of node (non-) participation in network communities

G Baltsou, A Gounaris, AN Papadopoulos… - Information Sciences, 2023 - Elsevier
Discovering communities in networks constitutes an active and significant research field,
especially in real-world networks, where communities usually represent functional units of …

Discovery of college students in financial hardship

C Guan, X Lu, X Li, E Chen, W Zhou… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
College students with financial difficulties refer to those whose families can hardly afford
their high tuition in universities, and should be supported by modern funding system. Indeed …

Contention-avoiding custom topology generation for network-on-chip

S Deniziak, R Tomaszewski - 2009 12th International …, 2009 - ieeexplore.ieee.org
In this paper we present a methodology for custom topology generation, offering low latency
and significantly reduced power consumption. The novelty of our approach lies in the …

The Motif‐Based Approach to the Analysis of the Employee Trajectories within Organization

E Novikova, Y Bekeneva… - Security and …, 2018 - Wiley Online Library
The analysis of the employees' movement within organization building is an important task
of the investigation of the business processes existing in the organization, including …

[PDF][PDF] Community Detection in Networks

G Baltsou - 2022 - ikee.lib.auth.gr
Networks are part of everyday life as they constitute a convenient way to represent data from
almost any domain, such as market systems [1], transportation systems [2], biological …

The Location-Centric Approach to Employee's Interaction Pattern Detection

E Novikova, Y Bekeneva… - 2019 27th Euromicro …, 2019 - ieeexplore.ieee.org
The task of the insider threat detection is one of the most sophisticated problems of the
information security. The analysis of the logs of the access control system may reveal on …