Sciweavers

9316 search results - page 1743 / 1864
» Analysis of traceback techniques
Sort
View
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 13 days ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...
KDD
2008
ACM
150views Data Mining» more  KDD 2008»
16 years 9 days ago
Hypergraph spectral learning for multi-label classification
A hypergraph is a generalization of the traditional graph in which the edges are arbitrary non-empty subsets of the vertex set. It has been applied successfully to capture highord...
Liang Sun, Shuiwang Ji, Jieping Ye
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 9 days ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
KDD
2007
ACM
153views Data Mining» more  KDD 2007»
16 years 9 days ago
Exploiting duality in summarization with deterministic guarantees
Summarization is an important task in data mining. A major challenge over the past years has been the efficient construction of fixed-space synopses that provide a deterministic q...
Panagiotis Karras, Dimitris Sacharidis, Nikos Mamo...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 9 days ago
A framework for classification and segmentation of massive audio data streams
In recent years, the proliferation of VOIP data has created a number of applications in which it is desirable to perform quick online classification and recognition of massive voi...
Charu C. Aggarwal
« Prev « First page 1743 / 1864 Last » Next »