Sciweavers

3651 search results - page 609 / 731
» Data Mining for Security Applications
Sort
View
111
Voted
WWW
2010
ACM
15 years 1 months ago
LINKREC: a unified framework for link recommendation with user attributes and graph structure
With the phenomenal success of networking sites (e.g., Facebook, Twitter and LinkedIn), social networks have drawn substantial attention. On online social networking sites, link r...
Zhijun Yin, Manish Gupta, Tim Weninger, Jiawei Han
131
Voted
SIGIR
2008
ACM
15 years 21 days ago
Advances in information and knowledge management
Several research areas today overlap between the tracks of databases, information retrieval and knowledge management, such as natural language processing, semantic web, digital li...
Aparna S. Varde, Jian Pei
91
Voted
DATAMINE
2002
104views more  DATAMINE 2002»
15 years 18 days ago
Cubegrades: Generalizing Association Rules
Cubegrades are generalization of association rules which represent how a set of measures (aggregates) is affected by modifying a cube through specialization (rolldown), generaliza...
Tomasz Imielinski, Leonid Khachiyan, Amin Abdulgha...
147
Voted
JIIS
2002
141views more  JIIS 2002»
15 years 13 days ago
Combining Approximation Techniques and Vector Quantization for Adaptable Similarity Search
Adaptable similarity queries based on quadratic form distance functions are widely popular in data mining application domains including multimedia, CAD, molecular biology or medica...
Christian Böhm, Hans-Peter Kriegel, Thomas Se...
79
Voted
NAR
2007
111views more  NAR 2007»
15 years 8 days ago
PEDANT genome database: 10 years online
The PEDANT genome database provides exhaustive annotation of 468 genomes by a broad set of bioinformatics algorithms. We describe recent developments of the PEDANT Web server. The...
M. Louise Riley, Thorsten Schmidt, Irena I. Artamo...