Sciweavers

8243 search results - page 1621 / 1649
» Can We Manage Trust
Sort
View
WWW
2007
ACM
14 years 9 months ago
Towards effective browsing of large scale social annotations
This paper is concerned with the problem of browsing social annotations. Today, a lot of services (e.g., Del.icio.us, Filckr) have been provided for helping users to manage and sh...
Rui Li, Shenghua Bao, Yong Yu, Ben Fei, Zhong Su
WWW
2002
ACM
14 years 9 months ago
Probabilistic query expansion using query logs
Query expansion has long been suggested as an effective way to resolve the short query and word mismatching problems. A number of query expansion methods have been proposed in tra...
Hang Cui, Ji-Rong Wen, Jian-Yun Nie, Wei-Ying Ma
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Mining relational data through correlation-based multiple view validation
Commercial relational databases currently store vast amounts of real-world data. The data within these relational repositories are represented by multiple relations, which are int...
Hongyu Guo, Herna L. Viktor
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
14 years 9 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
KDD
2004
ACM
144views Data Mining» more  KDD 2004»
14 years 9 months ago
IncSpan: incremental mining of sequential patterns in large database
Many real life sequence databases, such as customer shopping sequences, medical treatment sequences, etc., grow incrementally. It is undesirable to mine sequential patterns from s...
Hong Cheng, Xifeng Yan, Jiawei Han
« Prev « First page 1621 / 1649 Last » Next »