Sciweavers

3651 search results - page 581 / 731
» Data Mining for Security Applications
Sort
View
WWW
2009
ACM
16 years 1 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
NOSSDAV
2009
Springer
15 years 7 months ago
Robust live media streaming in swarms
Data dissemination in decentralized networks is often realized by using some form of swarming technique. Swarming enables nodes to gather dynamically in order to fulfill a certai...
Thomas Locher, Remo Meier, Roger Wattenhofer, Stef...
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 6 months ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede
ADBIS
1999
Springer
104views Database» more  ADBIS 1999»
15 years 5 months ago
Arbiter Meta-Learning with Dynamic Selection of Classifiers and Its Experimental Investigation
In data mining, the selection of an appropriate classifier to estimate the value of an unknown attribute for a new instance has an essential impact to the quality of the classifica...
Alexey Tsymbal, Seppo Puuronen, Vagan Y. Terziyan
EKAW
2000
Springer
15 years 4 months ago
KIDS: An Iterative Algorithm to Organize Relational Knowledge
The goal of conceptual clustering is to build a set of embedded classes, which cluster objects based on their similarities. Knowledge organization aims at generating the set of mos...
Isabelle Bournaud, Mélanie Courtine, Jean-D...