Sciweavers

2705 search results - page 484 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
120
Voted
IUI
2009
ACM
15 years 10 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...
131
Voted
PKDD
2007
Springer
141views Data Mining» more  PKDD 2007»
15 years 8 months ago
Automatic Hidden Web Database Classification
In this paper, a method for automatic classification of Hidden-Web databases is addressed. In our approach, the classification tree for Hidden Web databases is constructed by tailo...
Zhiguo Gong, Jingbai Zhang, Qian Liu
PKDD
2007
Springer
125views Data Mining» more  PKDD 2007»
15 years 8 months ago
Tag Recommendations in Folksonomies
Collaborative tagging systems allow users to assign keywords—so called “tags”—to resources. Tags are used for navigation, finding resources and serendipitous browsing and ...
Robert Jäschke, Leandro Balby Marinho, Andrea...
ISMIS
2005
Springer
15 years 7 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
RSFDGRC
2005
Springer
190views Data Mining» more  RSFDGRC 2005»
15 years 7 months ago
Finding Rough Set Reducts with SAT
Abstract. Feature selection refers to the problem of selecting those input features that are most predictive of a given outcome; a problem encountered in many areas such as machine...
Richard Jensen, Qiang Shen, Andrew Tuson