Sciweavers

1274 search results - page 216 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
IH
2001
Springer
15 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
15 years 10 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
PKDD
2007
Springer
141views Data Mining» more  PKDD 2007»
15 years 3 months ago
Automatic Hidden Web Database Classification
In this paper, a method for automatic classification of Hidden-Web databases is addressed. In our approach, the classification tree for Hidden Web databases is constructed by tailo...
Zhiguo Gong, Jingbai Zhang, Qian Liu
ADC
2006
Springer
188views Database» more  ADC 2006»
15 years 3 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
WSDM
2010
ACM
211views Data Mining» more  WSDM 2010»
15 years 2 months ago
IntervalRank - Isotonic Regression with Listwise and Pairwise Constraints
Ranking a set of retrieved documents according to their relevance to a given query has become a popular problem at the intersection of web search, machine learning, and informatio...
Taesup Moon, Alex Smola, Yi Chang, Zhaohui Zheng