Sciweavers

1968 search results - page 235 / 394
» Japanese Information Extraction with Automatically Extracted...
Sort
View
136
Voted
EGOV
2010
Springer
15 years 4 months ago
From Policy-Making Statements to First-Order Logic
Within a framework for enriched on-line discussion forums for e-government policy-making, pro and con statements for positions are input, structurally related, then logically repre...
Adam Wyner, Tom M. van Engers, Kiavash Bahreini
142
Voted
KDD
2001
ACM
262views Data Mining» more  KDD 2001»
16 years 4 months ago
LOGML: Log Markup Language for Web Usage Mining
Web Usage Mining refers to the discovery of interesting information from user navigational behavior as stored in web access logs. While extracting simple information from web logs...
John R. Punin, Mukkai S. Krishnamoorthy, Mohammed ...
139
Voted
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
15 years 7 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
131
Voted
KDD
2002
ACM
154views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining Protein Contact Maps
The 3D conformation of a protein may be compactly represented in a symmetrical, square, boolean matrix of pairwise, inter-residue contacts, or "contact map". The contact...
Jingjing Hu, Xiaolan Shen, Yu Shao, Chris Bystroff...
151
Voted
APSEC
1999
IEEE
15 years 8 months ago
An Approach for Measuring Software Evolution Using Source Code Features
One of the characteristics of large software systems is that they evolve over time. Evolution patterns include modifications related to the implementation, interfaces and the over...
Ladan Tahvildari, Richard Gregory, Kostas Kontogia...