Sciweavers

261 search results - page 42 / 53
» Application domain independent policy conflict analysis usin...
Sort
View
CCS
2011
ACM
13 years 9 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
CLEF
2006
Springer
15 years 1 months ago
MorphoSaurus in ImageCLEF 2006: The Effect of Subwords On Biomedical IR
We here describe the subword approach we used in the 2006 ImageCLEF Medical Image Retrieval task. It is based on the assupmtion that neither fully inflected nor automatically stem...
Philipp Daumke, Jan Paetzold, Kornél G. Mar...
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
15 years 9 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
15 years 10 months ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
15 years 9 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...