Sciweavers

3114 search results - page 589 / 623
» Distributed Case-Based Learning
Sort
View
127
Voted
WSDM
2009
ACM
140views Data Mining» more  WSDM 2009»
15 years 9 months ago
Effective latent space graph-based re-ranking model with global consistency
Recently the re-ranking algorithms have been quite popular for web search and data mining. However, one of the issues is that those algorithms treat the content and link informati...
Hongbo Deng, Michael R. Lyu, Irwin King
101
Voted
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 9 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
107
Voted
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
15 years 9 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
134
Voted
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 8 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
114
Voted
ATAL
2009
Springer
15 years 8 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen