Sciweavers

1575 search results - page 226 / 315
» The provenance of electronic data
Sort
View
WWW
2006
ACM
16 years 6 days ago
An e-market framework for informed trading
Fully automated trading, such as e-procurement, using the Internet is virtually unheard of today. Three core technologies are needed to fully automate the trading process: data mi...
John K. Debenham, Simeon J. Simoff
KDD
2008
ACM
132views Data Mining» more  KDD 2008»
15 years 12 months ago
Partitioned logistic regression for spam filtering
Naive Bayes and logistic regression perform well in different regimes. While the former is a very simple generative model which is efficient to train and performs well empirically...
Ming-wei Chang, Wen-tau Yih, Christopher Meek
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
15 years 12 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
KDD
2005
ACM
118views Data Mining» more  KDD 2005»
15 years 12 months ago
On the use of linear programming for unsupervised text classification
We propose a new algorithm for dimensionality reduction and unsupervised text classification. We use mixture models as underlying process of generating corpus and utilize a novel,...
Mark Sandler
CHI
2005
ACM
15 years 12 months ago
TRIBA: a cable television retrieval & awareness system
This paper discusses the design of a physical and digital system intended to allow for easy manipulation and interaction with the tremendous amount of options present in advanced ...
Michael Tseng, Jon Kolko