Sciweavers

245 search results - page 41 / 49
» The Iterated Weakest Link
Sort
View
ICDM
2005
IEEE
161views Data Mining» more  ICDM 2005»
15 years 5 months ago
Making Logistic Regression a Core Data Mining Tool with TR-IRLS
Binary classification is a core data mining task. For large datasets or real-time applications, desirable classifiers are accurate, fast, and need no parameter tuning. We presen...
Paul Komarek, Andrew W. Moore
JCDL
2005
ACM
161views Education» more  JCDL 2005»
15 years 5 months ago
Downloading textual hidden web content through keyword queries
An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to acc...
Alexandros Ntoulas, Petros Zerfos, Junghoo Cho
BMCBI
2002
134views more  BMCBI 2002»
14 years 11 months ago
CoreGenes: A computational tool for identifying and cataloging "core" genes in a set of small genomes
Background: Improvements in DNA sequencing technology and methodology have led to the rapid expansion of databases comprising DNA sequence, gene and genome data. Lower operational...
Nikhat Zafar, Raja Mazumder, Donald Seto
CONEXT
2010
ACM
14 years 9 months ago
LEGUP: using heterogeneity to reduce the cost of data center network upgrades
Fundamental limitations of traditional data center network architectures have led to the development of architectures that provide enormous bisection bandwidth for up to hundreds ...
Andrew R. Curtis, S. Keshav, Alejandro Lópe...
ACSAC
2010
IEEE
14 years 3 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon