Sciweavers

6094 search results - page 1072 / 1219
» Applications of a Color-Naming Database
Sort
View
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
16 years 5 months ago
Mining data records in Web pages
A large amount of information on the Web is contained in regularly structured objects, which we call data records. Such data records are important because they often present the e...
Bing Liu, Robert L. Grossman, Yanhong Zhai
144
Voted
KDD
2001
ACM
216views Data Mining» more  KDD 2001»
16 years 5 months ago
Real world performance of association rule algorithms
This study compares five well-known association rule algorithms using three real-world datasets and an artificial dataset. The experimental results confirm the performance improve...
Zijian Zheng, Ron Kohavi, Llew Mason
129
Voted
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
16 years 5 months ago
Data Mining for Typhoon Image Collection
This paper introduces the application of data mining methods to the analysis and prediction of the typhoon. The testbed for this research is the typhoon image collection that we e...
Asanobu Kitamoto
107
Voted
CHI
2005
ACM
16 years 5 months ago
Understanding research trends in conferences using paperLens
PaperLens is a novel visualization that reveals trends, connections, and activity throughout a conference community. It tightly couples views across papers, authors, and reference...
Bongshin Lee, Mary Czerwinski, George G. Robertson...
HPCA
2005
IEEE
16 years 5 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
« Prev « First page 1072 / 1219 Last » Next »