Sciweavers

3651 search results - page 614 / 731
» Data Mining for Security Applications
Sort
View
104
Voted
WWW
2009
ACM
16 years 1 months ago
Constructing folksonomies from user-specified relations on flickr
Automatic folksonomy construction from tags has attracted much attention recently. However, inferring hierarchical relations between concepts from tags has a drawback in that it i...
Anon Plangprasopchok, Kristina Lerman
WWW
2008
ACM
16 years 1 months ago
Query-sets: using implicit feedback and query patterns to organize web documents
In this paper we present a new document representation model based on implicit user feedback obtained from search engine queries. The main objective of this model is to achieve be...
Barbara Poblete, Ricardo A. Baeza-Yates
100
Voted
WWW
2008
ACM
16 years 1 months ago
iRobot: an intelligent crawler for web forums
We study in this paper the Web forum crawling problem, which is a very fundamental step in many Web applications, such as search engine and Web data mining. As a typical user-crea...
Rui Cai, Jiang-Ming Yang, Wei Lai, Yida Wang, Lei ...
202
Voted
PODS
2009
ACM
134views Database» more  PODS 2009»
16 years 1 months ago
An efficient rigorous approach for identifying statistically significant frequent itemsets
As advances in technology allow for the collection, storage, and analysis of vast amounts of data, the task of screening and assessing the significance of discovered patterns is b...
Adam Kirsch, Michael Mitzenmacher, Andrea Pietraca...
110
Voted
KDD
2008
ACM
178views Data Mining» more  KDD 2008»
16 years 1 months ago
Training structural svms with kernels using sampled cuts
Discriminative training for structured outputs has found increasing applications in areas such as natural language processing, bioinformatics, information retrieval, and computer ...
Chun-Nam John Yu, Thorsten Joachims