Sciweavers

7163 search results - page 1242 / 1433
» Privacy-Preserving Data Mining
Sort
View
JIPS
2010
195views more  JIPS 2010»
14 years 5 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
WSDM
2012
ACM
207views Data Mining» more  WSDM 2012»
13 years 6 months ago
Sequence clustering and labeling for unsupervised query intent discovery
One popular form of semantic search observed in several modern search engines is to recognize query patterns that trigger instant answers or domain-specific search, producing sem...
Jackie Chi Kit Cheung, Xiao Li
WSDM
2012
ACM
259views Data Mining» more  WSDM 2012»
13 years 6 months ago
Learning recommender systems with adaptive regularization
Many factorization models like matrix or tensor factorization have been proposed for the important application of recommender systems. The success of such factorization models dep...
Steffen Rendle
WSDM
2012
ACM
283views Data Mining» more  WSDM 2012»
13 years 6 months ago
The life and death of online groups: predicting group growth and longevity
We pose a fundamental question in understanding how to identify and design successful communities: What factors predict whether a community will grow and survive in the long term?...
Sanjay Ram Kairam, Dan J. Wang, Jure Leskovec
WSDM
2012
ACM
334views Data Mining» more  WSDM 2012»
13 years 6 months ago
mTrust: discerning multi-faceted trust in a connected world
Traditionally, research about trust assumes a single type of trust between users. However, trust, as a social concept, inherently has many facets indicating multiple and heterogen...
Jiliang Tang, Huiji Gao, Huan Liu
« Prev « First page 1242 / 1433 Last » Next »