Sciweavers

3651 search results - page 595 / 731
» Data Mining for Security Applications
Sort
View
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
15 years 11 months ago
Structured learning for non-smooth ranking losses
Learning to rank from relevance judgment is an active research area. Itemwise score regression, pairwise preference satisfaction, and listwise structured learning are the major te...
Soumen Chakrabarti, Rajiv Khanna, Uma Sawant, Chir...
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
15 years 11 months ago
Cost-effective outbreak detection in networks
Given a water distribution network, where should we place sensors to quickly detect contaminants? Or, which blogs should we read to avoid missing important stories? These seemingl...
Andreas Krause, Carlos Guestrin, Christos Faloutso...
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
15 years 11 months ago
The Impact of Site Structure and User Environment on Session Reconstruction in Web Usage Analysis
The analysis of user behavior on the Web presupposes a reliable reconstruction of the users' navigational activities. Cookies and server-generated session identifiers have be...
Bettina Berendt, Bamshad Mobasher, Miki Nakagawa, ...
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 8 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
15 years 8 months ago
You are who you know: Inferring user profiles in Online Social Networks
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...