Sciweavers

32 search results - page 7 / 7
» Measuring the Validity of Document Relations Discovered from...
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 5 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
14 years 6 months ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo