Sciweavers

3866 search results - page 609 / 774
» Classification of Ordinal Data
Sort
View
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 11 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 11 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
15 years 11 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao
113
Voted
AUSDM
2007
Springer
107views Data Mining» more  AUSDM 2007»
15 years 11 months ago
News Aware Volatility Forecasting: Is the Content of News Important?
The efficient market hypothesis states that the market incorporates all available information to provide an accurate valuation of the asset at any given time. However, most models...
Calum Robertson, Shlomo Geva, Rodney Wolff
ICARIS
2007
Springer
15 years 11 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...