Sciweavers

10038 search results - page 1882 / 2008
» Model Checking for Managers
Sort
View
115
Voted
CCS
2009
ACM
16 years 1 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
98
Voted
KDD
2009
ACM
164views Data Mining» more  KDD 2009»
16 years 1 months ago
Social influence analysis in large-scale networks
In large social networks, nodes (users, entities) are influenced by others for various reasons. For example, the colleagues have strong influence on one's work, while the fri...
Jie Tang, Jimeng Sun, Chi Wang, Zi Yang
121
Voted
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
16 years 1 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
89
Voted
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
16 years 1 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
126
Voted
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 1 months ago
Relational data pre-processing techniques for improved securities fraud detection
Commercial datasets are often large, relational, and dynamic. They contain many records of people, places, things, events and their interactions over time. Such datasets are rarel...
Andrew Fast, Lisa Friedland, Marc Maier, Brian Tay...
« Prev « First page 1882 / 2008 Last » Next »