Sciweavers

363 search results - page 28 / 73
» Analyzing Large Collections of Email
Sort
View
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
13 years 12 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
ESOP
2010
Springer
14 years 5 months ago
Separating Shape Graphs
Detailed memory models that expose individual fields are necessary to precisely analyze code that makes use of low-level aspects such as, pointers to fields and untagged unions. Ye...
Vincent Laviron, Bor-Yuh Evan Chang and Xavier Riv...
SOFSEM
2009
Springer
14 years 4 months ago
From Outermost Termination to Innermost Termination
Abstract. Rewriting is the underlying evaluation mechanism of functional programming languages. Therefore, termination analysis of term rewrite systems (TRSs) is an important techn...
René Thiemann
HAIS
2009
Springer
14 years 17 days ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
VLDB
1998
ACM
115views Database» more  VLDB 1998»
14 years 5 days ago
Bank of America Case Study: The Information Currency Advantage
This paper describes the external forces that motivate financial institutions to collect, aggregate, analyze, and mine data so that it can be transformed into information, one of ...
Felipe Cariño, Mark Jahnke