Sciweavers

2049 search results - page 209 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
90
Voted
CASDMKM
2004
Springer
131views Data Mining» more  CASDMKM 2004»
15 years 5 months ago
XML-Based Schemes for Business Project Portfolio Selection
Abstract. Many methodologies have been introduced to deal with project portfolio selection problem including some techniques that help to evaluate individual projects, or to select...
Jichang Dong, Kin Keung Lai, Shouyang Wang
WWW
2006
ACM
16 years 10 days ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
RAID
2009
Springer
15 years 6 months ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...
BMCBI
2005
153views more  BMCBI 2005»
14 years 11 months ago
Learning Statistical Models for Annotating Proteins with Function Information using Biomedical Text
Background: The BioCreative text mining evaluation investigated the application of text mining methods to the task of automatically extracting information from text in biomedical ...
Soumya Ray, Mark Craven
103
Voted
ICDE
2010
IEEE
177views Database» more  ICDE 2010»
15 years 6 months ago
Optimal load shedding with aggregates and mining queries
— To cope with bursty arrivals of high-volume data, a DSMS has to shed load while minimizing the degradation of Quality of Service (QoS). In this paper, we show that this problem...
Barzan Mozafari, Carlo Zaniolo