Sciweavers

3651 search results - page 606 / 731
» Data Mining for Security Applications
Sort
View
85
Voted
ICTAI
2007
IEEE
15 years 5 months ago
Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars
Context-sensitive graph grammar construction tools have been used to develop and study interesting languages. However, the high dimensionality of graph grammars result in costly e...
Keven Ates, Kang Zhang
ACSC
2006
IEEE
15 years 5 months ago
Unsupervised band removal leading to improved classification accuracy of hyperspectral images
Remotely-sensed images of the earth’s surface are used across a wide range of industries and applications including agriculture, mining, defence, geography and geology, to name ...
R. Ian Faulconbridge, Mark R. Pickering, Michael J...
ICDCS
2006
IEEE
15 years 5 months ago
Adaptive Control of Extreme-scale Stream Processing Systems
Abstract— Distributed stream processing systems offer a highly scalable and dynamically configurable platform for time-critical applications ranging from real-time, exploratory ...
Lisa Amini, Navendu Jain, Anshul Sehgal, Jeremy Si...
IDEAS
2006
IEEE
109views Database» more  IDEAS 2006»
15 years 5 months ago
Collaborative Filtering Process in a Whole New Light
Collaborative Filtering (CF) Systems are gaining widespread acceptance in recommender systems and ecommerce applications. These systems combine information retrieval and data mini...
Panagiotis Symeonidis, Alexandros Nanopoulos, Apos...
82
Voted
SAC
2005
ACM
15 years 4 months ago
Automatic wrapper maintenance for semi-structured web sources using results from previous queries
During the last years, significant attention has been paid to the problem of building wrappers for extracting data from semistructured web sources. Nevertheless, since web sources...
Juan Raposo, Alberto Pan, Manuel Álvarez, &...