Sciweavers

956 search results - page 140 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
15 years 10 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
SERVICES
2010
119views more  SERVICES 2010»
14 years 11 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
CIKM
2011
Springer
13 years 9 months ago
Content-driven detection of campaigns in social media
We study the problem of detecting coordinated free text campaigns in large-scale social media. These campaigns – ranging from coordinated spam messages to promotional and advert...
Kyumin Lee, James Caverlee, Zhiyuan Cheng, Daniel ...
ISM
2006
IEEE
111views Multimedia» more  ISM 2006»
15 years 3 months ago
Compressed-Domain Encryption of Adapted H.264 Video
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personal...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
WEBDB
2009
Springer
131views Database» more  WEBDB 2009»
15 years 4 months ago
Functional Dependency Generation and Applications in Pay-As-You-Go Data Integration Systems
Recently, the opportunity of extracting structured data from the Web has been identified by a number of research projects. One such example is that millions of relational-style H...
Daisy Zhe Wang, Xin Luna Dong, Anish Das Sarma, Mi...