Sciweavers

382 search results - page 59 / 77
» Using symbolic objects to cluster web documents
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
15 years 9 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
78
Voted
AAAI
2012
13 years 1 days ago
Multinomial Relation Prediction in Social Data: A Dimension Reduction Approach
The recent popularization of social web services has made them one of the primary uses of the World Wide Web. An important concept in social web services is social actions such as...
Nozomi Nori, Danushka Bollegala, Hisashi Kashima
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
15 years 10 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
DGO
2006
134views Education» more  DGO 2006»
14 years 11 months ago
Next steps in near-duplicate detection for eRulemaking
Large volume public comment campaigns and web portals that encourage the public to customize form letters produce many near-duplicate documents, which increases processing and sto...
Hui Yang, Jamie Callan, Stuart W. Shulman
ICCV
1995
IEEE
15 years 1 months ago
Closed-World Tracking
A new approach to tracking weakly modeled objects in a semantically rich domain is presented. We define a closed-world as a space-time region of an image sequence in which the co...
Stephen S. Intille, Aaron F. Bobick