Sciweavers

3651 search results - page 616 / 731
» Data Mining for Security Applications
Sort
View
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
15 years 5 months ago
Adaptive subjective triggers for opinionated document retrieval
This paper proposes a novel application of a statistical language model to opinionated document retrieval targeting weblogs (blogs). In particular, we explore the use of the trigg...
Kazuhiro Seki, Kuniaki Uehara
WSDM
2009
ACM
158views Data Mining» more  WSDM 2009»
15 years 5 months ago
A new visual search interface for web browsing
We introduce a new visual search interface for search engines. The interface is a user-friendly and informative graphical front-end for organizing and presenting search results in...
Songhua Xu, Tao Jin, Francis Chi-Moon Lau
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
15 years 5 months ago
Modeling and predicting user behavior in sponsored search
Implicit user feedback, including click-through and subsequent browsing behavior, is crucial for evaluating and improving the quality of results returned by search engines. Severa...
Josh Attenberg, Sandeep Pandey, Torsten Suel
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 5 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
ICDM
2009
IEEE
149views Data Mining» more  ICDM 2009»
15 years 5 months ago
Accelerated Gradient Method for Multi-task Sparse Learning Problem
—Many real world learning problems can be recast as multi-task learning problems which utilize correlations among different tasks to obtain better generalization performance than...
Xi Chen, Weike Pan, James T. Kwok, Jaime G. Carbon...