Sciweavers

176 search results - page 26 / 36
» Determining Term Subjectivity and Term Orientation for Opini...
Sort
View
DOLAP
2004
ACM
15 years 5 months ago
Developing a characterization of business intelligence workloads for sizing new database systems
Computer system sizing involves estimating the amount of hardware resources needed to support a new workload not yet deployed in a production environment. In order to determine th...
Ted J. Wasserman, Patrick Martin, David B. Skillic...
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
16 years 3 days ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
JCDL
2004
ACM
170views Education» more  JCDL 2004»
15 years 5 months ago
Looking for new, not known music only: music retrieval by melody style
With the growth of digital music, content-based music retrieval (CBMR) has attracted increasingly attention. For most CBMR systems, the task is to return music objects similar to ...
Fang-Fei Kuo, Man-Kwan Shan
KDD
2007
ACM
153views Data Mining» more  KDD 2007»
16 years 3 days ago
Exploiting duality in summarization with deterministic guarantees
Summarization is an important task in data mining. A major challenge over the past years has been the efficient construction of fixed-space synopses that provide a deterministic q...
Panagiotis Karras, Dimitris Sacharidis, Nikos Mamo...
CCS
2003
ACM
15 years 5 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...