Sciweavers

2049 search results - page 311 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
15 years 8 months ago
Boilerplate Detection using Shallow Text Features
In addition to the actual content Web pages consist of navigational elements, templates, and advertisements. This boilerplate text typically is not related to the main content, ma...
Christian Kohlschütter, Peter Fankhauser, Wol...
PAKDD
2009
ACM
112views Data Mining» more  PAKDD 2009»
15 years 6 months ago
Romanization of Thai Proper Names Based on Popularity of Usages
The lack of standards for Romanization of Thai proper names makes searching activity a challenging task. This is particularly important when searching for people-related documents ...
Akegapon Tangverapong, Atiwong Suchato, Proadpran ...
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
15 years 5 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao
ICDM
2005
IEEE
118views Data Mining» more  ICDM 2005»
15 years 4 months ago
A Heterogeneous Field Matching Method for Record Linkage
Record linkage is the process of determining that two records refer to the same entity. A key subprocess is evaluating how well the individual fields, or attributes, of the recor...
Steven Minton, Claude Nanjo, Craig A. Knoblock, Ma...
PAKDD
2004
ACM
100views Data Mining» more  PAKDD 2004»
15 years 4 months ago
Using Self-Consistent Naive-Bayes to Detect Masquerades
To gain access to account privileges, an intruder masquerades as the proper account user. This paper proposes a new strategy for detecting masquerades in a multiuser system. To det...
Kwong H. Yung