...
Social network analysis, clustering, or influence detection.
Detection and analysis of fraud or attack.
Graph-based searches.
Inventory and management of IT network resources, mapping quality of service, or analysis of root cause.
Master data management, ownership, or hierarchical organization.
...
Related articles
...
Child pages (Children Display) |
---|