Sciweavers

2958 search results - page 310 / 592
» Using Anonymized Data for Classification
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 11 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
15 years 9 months ago
Understand Corporate Rationales for Engaging in Reverse Stock Splits - A Data Mining Application
There has been much written on the individual topics of bankruptcy prediction, corporate performance, and reverse stock splits. However, there is little research into the relation...
Melody Y. Kiang, Dorothy M. Fisher, Steve A. Fishe...
CHI
2008
ACM
15 years 6 months ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
SDM
2004
SIAM
174views Data Mining» more  SDM 2004»
15 years 5 months ago
Classifying Documents Without Labels
Automatic classification of documents is an important area of research with many applications in the fields of document searching, forensics and others. Methods to perform classif...
Daniel Barbará, Carlotta Domeniconi, Ning K...
MM
1999
ACM
150views Multimedia» more  MM 1999»
15 years 8 months ago
Heuristic approach for generic audio data segmentation and annotation
A real-time audio segmentation and indexing scheme is presented in this paper. Audio recordings are segmented and classified into basic audio types such as silence, speech, music,...
Tong Zhang, C. C. Jay Kuo