Sciweavers

417 search results - page 82 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
14 years 6 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
WCRE
1999
IEEE
13 years 10 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
ICDCS
2010
IEEE
13 years 9 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
14 years 6 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
BMCBI
2008
117views more  BMCBI 2008»
13 years 5 months ago
An iterative block-shifting approach to retention time alignment that preserves the shape and area of gas chromatography-mass sp
Background: Metabolomics, petroleum and biodiesel chemistry, biomarker discovery, and other fields which rely on high-resolution profiling of complex chemical mixtures generate da...
Minho Chae, Robert J. Shmookler Reis, John J. Thad...