Sciweavers

1220 search results - page 202 / 244
» Probabilistic models for pattern statistics
Sort
View
124
Voted
WWW
2008
ACM
16 years 4 months ago
Mining for personal name aliases on the web
We propose a novel approach to find aliases of a given name from the web. We exploit a set of known names and their aliases as training data and extract lexical patterns that conv...
Danushka Bollegala, Taiki Honma, Yutaka Matsuo, Mi...
WWW
2007
ACM
16 years 4 months ago
Why we search: visualizing and predicting user behavior
The aggregation and comparison of behavioral patterns on the WWW represent a tremendous opportunity for understanding past behaviors and predicting future behaviors. In this paper...
Eytan Adar, Daniel S. Weld, Brian N. Bershad, Stev...
SAC
2010
ACM
15 years 10 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
127
Voted
ICDM
2008
IEEE
96views Data Mining» more  ICDM 2008»
15 years 9 months ago
Filling in the Blanks - Krimp Minimisation for Missing Data
Many data sets are incomplete. For correct analysis of such data, one can either use algorithms that are designed to handle missing data or use imputation. Imputation has the bene...
Jilles Vreeken, Arno Siebes
ICC
2007
IEEE
15 years 9 months ago
Outage Performance of Wireless Systems with LCMV Beamforming for Dominant Interferers Cancellation
— This paper investigates the outage probability of a wireless system with linear constrained minimum variance (LCMV) beamforming using a uniform linear array beamformer. LCMV be...
Hanyu Li, Yu-Dong Yao, Jin Yu