Sciweavers

8031 search results - page 1307 / 1607
» Knowledge and Workflow Systems
Sort
View
CHI
2009
ACM
16 years 5 months ago
Resonance on the web: web dynamics and revisitation patterns
The Web is a dynamic, ever-changing collection of information accessed in a dynamic way. This paper explores the relationship between Web page content change (obtained from an hou...
Eytan Adar, Jaime Teevan, Susan T. Dumais
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 5 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 4 months ago
Density-based clustering for real-time stream data
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...
Yixin Chen, Li Tu
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 4 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 4 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
« Prev « First page 1307 / 1607 Last » Next »