Sciweavers

3651 search results - page 544 / 731
» Data Mining for Security Applications
Sort
View
ICDE
2007
IEEE
182views Database» more  ICDE 2007»
16 years 6 months ago
Discriminative Frequent Pattern Analysis for Effective Classification
The application of frequent patterns in classification appeared in sporadic studies and achieved initial success in the classification of relational data, text documents and graph...
Hong Cheng, Xifeng Yan, Jiawei Han, Chih-Wei Hsu
WWW
2010
ACM
16 years 12 days ago
Keyword extraction for social snippets
Today, a huge amount of text is being generated for social purposes on social networking services on the Web. Unlike traditional documents, such text is usually extremely short an...
Zhenhui Li, Ding Zhou, Yun-Fang Juan, Jiawei Han
CIKM
2009
Springer
16 years 3 hour ago
iPoG: fast interactive proximity querying on graphs
Given an author-conference graph, how do we answer proximity queries (e.g., what are the most related conferences for John Smith?); how can we tailor the search result if the user...
Hanghang Tong, Huiming Qu, Hani Jamjoom, Christos ...
JCDL
2009
ACM
127views Education» more  JCDL 2009»
15 years 12 months ago
Finding topic trends in digital libraries
We propose a generative model based on latent Dirichlet allocation for mining distinct topics in document collections by integrating the temporal ordering of documents into the ge...
Levent Bolelli, Seyda Ertekin, Ding Zhou, C. Lee G...
MEDES
2009
ACM
15 years 10 months ago
Web page ranking based on fuzzy and learning automata
The main goal of web pages ranking is to find the interrelated pages. In this paper, we introduce an algorithm called FPR-DLA. In the proposed method learning automata is assigned...
Zohreh Anari, Mohammad Reza Meybodi, Babak Anari