Sciweavers

2399 search results - page 405 / 480
» Avatar Information Extraction System
Sort
View
127
Voted
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
16 years 4 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
ICN
2009
Springer
15 years 10 months ago
Measuring Route Diversity in the Internet from Remote Vantage Points
Recent works on modeling the Internet topology [8, 9] have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimplified without sac...
Andrea Di Menna, Tiziana Refice, Luca Cittadini, G...
NDSS
2008
IEEE
15 years 10 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
BMCBI
2007
126views more  BMCBI 2007»
15 years 4 months ago
Using gene expression data and network topology to detect substantial pathways, clusters and switches during oxygen deprivation
Background: Biochemical investigations over the last decades have elucidated an increasingly complete image of the cellular metabolism. To derive a systems view for the regulation...
Gunnar Schramm, Marc Zapatka, Roland Eils, Rainer ...
JOT
2008
142views more  JOT 2008»
15 years 4 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon