Sciweavers

1202 search results - page 219 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
16 years 1 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
ICDE
2008
IEEE
167views Database» more  ICDE 2008»
16 years 1 months ago
Automatic Extraction of Useful Facet Hierarchies from Text Databases
Databases of text and text-annotated data constitute a significant fraction of the information available in electronic form. Searching and browsing are the typical ways that users ...
Wisam Dakka, Panagiotis G. Ipeirotis
WWW
2009
ACM
16 years 14 days ago
Learning to recognize reliable users and content in social media with coupled mutual reinforcement
Community Question Answering (CQA) has emerged as a popular forum for users to pose questions for other users to answer. Over the last few years, CQA portals such as Naver and Yah...
Jiang Bian, Yandong Liu, Ding Zhou, Eugene Agichte...
WWW
2009
ACM
16 years 14 days ago
RuralCafe: web search in the rural developing world
The majority of people in rural developing regions do not have access to the World Wide Web. Traditional network connectivity technologies have proven to be prohibitively expensiv...
Jay Chen, Lakshminarayanan Subramanian, Jinyang Li
KDD
2004
ACM
209views Data Mining» more  KDD 2004»
16 years 5 days ago
Tracking dynamics of topic trends using a finite mixture model
In a wide range of business areas dealing with text data streams, including CRM, knowledge management, and Web monitoring services, it is an important issue to discover topic tren...
Satoshi Morinaga, Kenji Yamanishi