Sciweavers

1110 search results - page 201 / 222
» Clustering with the Connectivity Kernel
Sort
View
SIGMOD
2008
ACM
179views Database» more  SIGMOD 2008»
14 years 7 months ago
BibNetMiner: mining bibliographic information networks
Online bibliographic databases, such as DBLP in computer science and PubMed in medical sciences, contain abundant information about research publications in different fields. Each...
Yizhou Sun, Tianyi Wu, Zhijun Yin, Hong Cheng, Jia...
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 7 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
EDBT
2008
ACM
122views Database» more  EDBT 2008»
14 years 7 months ago
Semantic peer, here are the neighbors you want!
Peer Data Management Systems (PDMSs) have been introduced as a solution to the problem of large-scale sharing of semantically rich data. A PDMS consists of semantic peers connecte...
Wilma Penzo, Stefano Lodi, Federica Mandreoli, Ric...
CIKM
2009
Springer
14 years 2 months ago
Scalable learning of collective behavior based on sparse social dimensions
The study of collective behavior is to understand how individuals behave in a social network environment. Oceans of data generated by social media like Facebook, Twitter, Flickr a...
Lei Tang, Huan Liu
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 2 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...