Sciweavers

3651 search results - page 595 / 731
» Data Mining for Security Applications
Sort
View
123
Voted
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
16 years 1 months ago
Structured learning for non-smooth ranking losses
Learning to rank from relevance judgment is an active research area. Itemwise score regression, pairwise preference satisfaction, and listwise structured learning are the major te...
Soumen Chakrabarti, Rajiv Khanna, Uma Sawant, Chir...
120
Voted
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
16 years 1 months ago
Cost-effective outbreak detection in networks
Given a water distribution network, where should we place sensors to quickly detect contaminants? Or, which blogs should we read to avoid missing important stories? These seemingl...
Andreas Krause, Carlos Guestrin, Christos Faloutso...
95
Voted
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
16 years 1 months ago
The Impact of Site Structure and User Environment on Session Reconstruction in Web Usage Analysis
The analysis of user behavior on the Web presupposes a reliable reconstruction of the users' navigational activities. Cookies and server-generated session identifiers have be...
Bettina Berendt, Bamshad Mobasher, Miki Nakagawa, ...
115
Voted
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 10 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
112
Voted
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
15 years 10 months ago
You are who you know: Inferring user profiles in Online Social Networks
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...