Sciweavers

1289 search results - page 73 / 258
» Mining models of human activities from the web
Sort
View
81
Voted
WWW
2004
ACM
15 years 12 months ago
A hybrid approach for searching in the semantic web
This paper presents a search architecture that combines classical search techniques with spread activation techniques applied to a semantic model of a given domain. Given an ontol...
Cristiano Rocha, Daniel Schwabe, Marcus Poggi de A...
AUSAI
2007
Springer
15 years 5 months ago
Merging Algorithm to Reduce Dimensionality in Application to Web-Mining
Dimensional reduction may be effective in order to compress data without loss of essential information. Also, it may be useful in order to smooth data and reduce random noise. The...
Vladimir Nikulin, Geoffrey J. McLachlan
DAGSTUHL
2007
15 years 19 days ago
Integrated Human Behavior Modeling
In order to prevent emergencies or critical situations where humans are the origin, a timely provision of information thus obtained for the coordinating services and the on-site st...
Michael Berger, Dagmar Beyer, Stephan Prueckner
EDBT
2002
ACM
159views Database» more  EDBT 2002»
15 years 11 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 6 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic