Sciweavers

114 search results - page 20 / 23
» Mining Impact-Targeted Activity Patterns in Imbalanced Data
Sort
View
ICPR
2010
IEEE
15 years 1 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
WABI
2009
Springer
124views Bioinformatics» more  WABI 2009»
15 years 4 months ago
Mimosa: Mixture Model of Co-expression to Detect Modulators of Regulatory Interaction
Background: Functionally related genes tend to be correlated in their expression patterns across multiple conditions and/or tissue-types. Thus co-expression networks are often use...
Matthew Hansen, Logan Everett, Larry Singh, Sridha...
CASCON
2010
187views Education» more  CASCON 2010»
14 years 8 months ago
A Framework for Automatically Supporting End-Users in Service Composition
In Service Oriented Architecture (SOA), service composition integrates existing services to fulfill specific tasks using a set of standards and tools. However, current service comp...
Hua Xiao, Ying Zou, Ran Tang, Joanna Ng, Leho Nigu...
KDD
2007
ACM
148views Data Mining» more  KDD 2007»
15 years 10 months ago
Detecting research topics via the correlation between graphs and texts
In this paper we address the problem of detecting topics in large-scale linked document collections. Recently, topic detection has become a very active area of research due to its...
Yookyung Jo, Carl Lagoze, C. Lee Giles
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 4 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon