Sciweavers

1298 search results - page 168 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
137
Voted
DATAMINE
2002
135views more  DATAMINE 2002»
15 years 3 months ago
Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization
: Web usage mining, possibly used in conjunction with standard approaches to personalization such as collaborative filtering, can help address some of the shortcomings of these tec...
Bamshad Mobasher, Honghua Dai, Tao Luo, Miki Nakag...
169
Voted
ADC
2007
Springer
183views Database» more  ADC 2007»
15 years 7 months ago
Efficient Similarity Search by Summarization in Large Video Database
With the explosion of video data, video processing technologies have advanced quickly and been applied into many fields, such as advertisements, medical etc.. To fast search these...
Xiangmin Zhou, Xiaofang Zhou, Heng Tao Shen
133
Voted
SIGIR
2009
ACM
15 years 10 months ago
Automatic video tagging using content redundancy
The analysis of the leading social video sharing platform YouTube reveals a high amount of redundancy, in the form of videos with overlapping or duplicated content. In this paper,...
Stefan Siersdorfer, José San Pedro, Mark Sa...
153
Voted
CN
2007
123views more  CN 2007»
15 years 3 months ago
Information retrieval in schema-based P2P systems using one-dimensional semantic space
The widespread use of RDF-based information necessitates efficient information retrieval techniques in wide-area networks. In this paper, we present Dynamic Semantic Space, a sche...
Tao Gu, Hung Keng Pung, Daqing Zhang
148
Voted
SAC
2010
ACM
15 years 10 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil