Sciweavers

17 search results - page 3 / 4
» KDD-99: The Fifth ACM SIGKDD International Conference on Kno...
Sort
View
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
14 years 6 months ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...
KDD
2009
ACM
158views Data Mining» more  KDD 2009»
14 years 6 months ago
Feature shaping for linear SVM classifiers
: ? Feature Shaping for Linear SVM Classifiers George Forman, Martin Scholz, Shyamsundar Rajaram HP Laboratories HPL-2009-31R1 text classification machine learning, feature weighti...
George Forman, Martin Scholz, Shyamsundar Rajaram
KDD
2009
ACM
172views Data Mining» more  KDD 2009»
14 years 6 months ago
Towards combining web classification and web information extraction: a case study
: ? Towards Combining Web Classification and Web Information Extraction: a Case Study Ping Luo, Fen Lin, Yuhong Xiong, Yong Zhao, Zhongzhi Shi HP Laboratories HPL-2009-86 Classific...
Ping Luo, Fen Lin, Yuhong Xiong, Yong Zhao, Zhongz...
KDD
2008
ACM
161views Data Mining» more  KDD 2008»
14 years 6 months ago
Locality sensitive hash functions based on concomitant rank order statistics
: Locality Sensitive Hash functions are invaluable tools for approximate near neighbor problems in high dimensional spaces. In this work, we are focused on LSH schemes where the si...
Kave Eshghi, Shyamsundar Rajaram
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 6 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé