Sciweavers

377 search results - page 60 / 76
» Mining the data from a hyperheuristic approach using associa...
Sort
View
ICML
2009
IEEE
15 years 10 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...
DATAMINE
1999
152views more  DATAMINE 1999»
14 years 9 months ago
Discovery of Frequent DATALOG Patterns
Discovery of frequent patterns has been studied in a variety of data mining settings. In its simplest form, known from association rule mining, the task is to discover all frequent...
Luc Dehaspe, Hannu Toivonen
PAMI
2007
196views more  PAMI 2007»
14 years 9 months ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
15 years 4 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
16 years 9 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang