Sciweavers

3651 search results - page 605 / 731
» Data Mining for Security Applications
Sort
View
114
Voted
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
15 years 11 months ago
Computing Clusters of Correlation Connected Objects
The detection of correlations between different features in a set of feature vectors is a very important data mining task because correlation indicates a dependency between the fe...
Christian Böhm, Karin Kailing, Peer Krög...
SDM
2009
SIAM
127views Data Mining» more  SDM 2009»
15 years 8 months ago
Event Discovery in Time Series.
The discovery of events in time series can have important implications, such as identifying microlensing events in astronomical surveys, or changes in a patient’s electrocardiog...
Carla E. Brodley, Dan Preston, Pavlos Protopapas
82
Voted
CIKM
2009
Springer
15 years 5 months ago
An analysis of information diffusion in the blog world
In the blog world, bloggers produce information, establish relationships with other bloggers in order to exchange information, and form a blog network, an online social network. I...
Yong-Suk Kwon, Sang-Wook Kim, Sunju Park
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 5 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
DEEC
2007
IEEE
15 years 5 months ago
DeepBot: a focused crawler for accessing hidden web content
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...