Sciweavers

1701 search results - page 135 / 341
» Providing k-anonymity in data mining
Sort
View
WWW
2009
ACM
15 years 10 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other use...
Andreas Lommatzsch, Christian Bauckhage, Jé...
CSE
2009
IEEE
15 years 4 months ago
Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs
Abstract—Gold farming refers to the illicit practice of gathering and selling virtual goods in online games for real money. Although around one million gold farmers engage in gol...
Muhammad Aurangzeb Ahmad, Brian Keegan, Jaideep Sr...
EPIA
2005
Springer
15 years 3 months ago
CONAN: An Integrative System for Biomedical Literature Mining
The amount of information about the genome, transcriptome and proteome, forms a problem for the scientific community: how to find the right information in a reasonable amount of ...
Rainer Malik, Arno Siebes
CORR
2004
Springer
218views Education» more  CORR 2004»
14 years 10 months ago
A Dynamic Clustering-Based Markov Model for Web Usage Mining
Markov models have been widely utilized for modelling user web navigation behaviour. In this work we propose a dynamic clustering-based method to increase a Markov model's ac...
José Borges, Mark Levene
ISSTA
2009
ACM
15 years 4 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...