Sciweavers

2049 search results - page 358 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 12 days ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 8 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
103
Voted
WSDM
2010
ACM
259views Data Mining» more  WSDM 2010»
15 years 8 months ago
Revisiting Globally Sorted Indexes for Efficient Document Retrieval
There has been a large amount of research on efficient document retrieval in both IR and web search areas. One important technique to improve retrieval efficiency is early termina...
Fan Zhang, Shuming Shi, Hao Yan, Ji-Rong Wen
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
15 years 4 months ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
15 years 11 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor