Sciweavers

5962 search results - page 1020 / 1193
» Working with Patterns and Code
Sort
View
KDD
2010
ACM
293views Data Mining» more  KDD 2010»
15 years 7 months ago
BioSnowball: automated population of Wikis
Internet users regularly have the need to find biographies and facts of people of interest. Wikipedia has become the first stop for celebrity biographies and facts. However, Wik...
Xiaojiang Liu, Zaiqing Nie, Nenghai Yu, Ji-Rong We...
CSB
2004
IEEE
164views Bioinformatics» more  CSB 2004»
15 years 7 months ago
Biclustering in Gene Expression Data by Tendency
The advent of DNA microarray technologies has revolutionized the experimental study of gene expression. Clustering is the most popular approach of analyzing gene expression data a...
Jinze Liu, Jiong Yang, Wei Wang 0010
CCS
2006
ACM
15 years 7 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
FLAIRS
2010
15 years 6 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
141
Voted
CPAIOR
2008
Springer
15 years 5 months ago
Connections in Networks: A Hybrid Approach
This paper extends our previous work by exploring the use of a hybrid solution method for solving the connection subgraph problem. We employ a two phase solution method, which dras...
Carla P. Gomes, Willem Jan van Hoeve, Ashish Sabha...
« Prev « First page 1020 / 1193 Last » Next »