Sciweavers

1294 search results - page 195 / 259
» Privacy and Data Mining: New Developments and Challenges
Sort
View
IOPADS
1997
94views more  IOPADS 1997»
14 years 11 months ago
Remote I/O Fast Access to Distant Storage
As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally add...
Ian T. Foster, David Kohr, Rakesh Krishnaiyer, Jac...
96
Voted
IWANN
2009
Springer
15 years 4 months ago
Identifying Gene Ontology Areas for Automated Enrichment
Biomedical ontologies provide a commonly accepted scheme for the characterization of biological concepts that enable knowledge sharing and integration. Updating and maintaining an ...
Catia Pesquita, Tiago Grego, Francisco M. Couto
88
Voted
WWW
2010
ACM
15 years 5 months ago
Large-scale bot detection for search engines
In this paper, we propose a semi-supervised learning approach for classifying program (bot) generated web search traffic from that of genuine human users. The work is motivated by...
Hongwen Kang, Kuansan Wang, David Soukal, Fritz Be...
KDD
2003
ACM
449views Data Mining» more  KDD 2003»
15 years 10 months ago
Passenger-based predictive modeling of airline no-show rates
Airlines routinely overbook flights based on the expectation that some fraction of booked passengers will not show for each flight. Accurate forecasts of the expected number of no...
Richard D. Lawrence, Se June Hong, Jacques Cherrie...
DMIN
2010
262views Data Mining» more  DMIN 2010»
14 years 8 months ago
SMO-Style Algorithms for Learning Using Privileged Information
Recently Vapnik et al. [11, 12, 13] introduced a new learning model, called Learning Using Privileged Information (LUPI). In this model, along with standard training data, the tea...
Dmitry Pechyony, Rauf Izmailov, Akshay Vashist, Vl...