Sciweavers

956 search results - page 122 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
ICDM
2002
IEEE
123views Data Mining» more  ICDM 2002»
15 years 2 months ago
Towards Automatic Generation of Query Taxonomy: A Hierarchical Query Clustering Approach
Previous works on automatic query clustering most generate a flat, un-nested partition of query terms. In this work, we are pursuing to organize query terms into a hierarchical s...
Shui-Lung Chuang, Lee-Feng Chien
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
15 years 7 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
WWW
2008
ACM
15 years 10 months ago
Acquisition of a vernacular gazetteer from web sources
Vernacular place names are names that are commonly in use to refer to geographical places. For purposes of effective information retrieval, the spatial extent associated with thes...
Florian A. Twaroch, Christopher B. Jones, Alia I. ...
SAC
2008
ACM
14 years 9 months ago
Efficient concept clustering for ontology learning using an event life cycle on the web
Ontology learning integrates many complementary techniques, including machine learning, natural language processing, and data mining. Specifically, clustering techniques facilitat...
Sangsoo Sung, Seokkyung Chung, Dennis McLeod
WWW
2008
ACM
15 years 10 months ago
Privacy-enhanced sharing of personal content on the web
Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and host...
Mohammad Mannan, Paul C. van Oorschot