Sciweavers

326 search results - page 26 / 66
» Misuse detection for information retrieval systems
Sort
View
79
Voted
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
15 years 9 months ago
Boilerplate Detection using Shallow Text Features
In addition to the actual content Web pages consist of navigational elements, templates, and advertisements. This boilerplate text typically is not related to the main content, ma...
Christian Kohlschütter, Peter Fankhauser, Wol...
KDD
2003
ACM
120views Data Mining» more  KDD 2003»
16 years 24 days ago
On detecting differences between groups
Understanding the differences between contrasting groups is a fundamental task in data analysis. This realization has led to the development of a new special purpose data mining t...
Geoffrey I. Webb, Shane M. Butler, Douglas A. Newl...
94
Voted
ICASSP
2008
IEEE
15 years 6 months ago
Onset detection in pitched non-percussive music using warping-compensated correlation
Automatically extracting temporal information from musical recordings is inarguably one of the most critical subtasks of many music information retrieval systems. In this paper we...
Olaf Schleusing, Bingjun Zhang, Ye Wang
137
Voted
AIRWEB
2009
Springer
15 years 7 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
IRI
2006
IEEE
15 years 6 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...