Sciweavers

409 search results - page 63 / 82
» Review spam detection
Sort
View
DAGSTUHL
1998
15 years 1 months ago
On Active Deductive Databases: The Statelog Approach
After brie y reviewing the basic notions and terminology of active rules and relating them to production rules and deductive rules, respectively, we survey a number of formal appro...
Georg Lausen, Bertram Ludäscher, Wolfgang May
BIB
2008
75views more  BIB 2008»
14 years 12 months ago
Gene-set approach for expression pattern analysis
Recently developed gene set analysis methods evaluate differential expression patterns of gene groups instead of those of individual genes. This approach especially targets gene g...
Dougu Nam, Seon-Young Kim
IJDE
2006
77views more  IJDE 2006»
14 years 11 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
IPM
2006
151views more  IPM 2006»
14 years 11 months ago
Document clustering using nonnegative matrix factorization
A methodology for automatically identifying and clustering semantic features or topics in a heterogeneous text collection is presented. Textual data is encoded using a low rank no...
Farial Shahnaz, Michael W. Berry, V. Paul Pauca, R...
EC
2007
101views ECommerce» more  EC 2007»
14 years 11 months ago
Revisiting Negative Selection Algorithms
This paper reviews the progress of negative selection algorithms, an anomaly/change detection approach in Artificial Immune Systems (AIS). Following its initial model, we try to ...
Zhou Ji, Dipankar Dasgupta