Sciweavers

1274 search results - page 172 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
15 years 10 months ago
Usage-Based PageRank for Web Personalization
Recommendation algorithms aim at proposing “next” pages to a user based on her current visit and the past users’ navigational patterns. In the vast majority of related algor...
Magdalini Eirinaki, Michalis Vazirgiannis
BIBE
2006
IEEE
138views Bioinformatics» more  BIBE 2006»
15 years 10 months ago
Assigning Schema Labels Using Ontology And Hueristics
Bioinformatics data is growing at a phenomenal rate. Besides the exponential growth of individual databases, the number of data depositories is increasing too. Because of the comp...
Xuan Zhang, Ruoming Jin, Gagan Agrawal
ESWS
2010
Springer
15 years 7 months ago
Efficient Semantic-Aware Detection of Near Duplicate Resources
Abstract. Efficiently detecting near duplicate resources is an important task when integrating information from various sources and applications. Once detected, near duplicate reso...
Ekaterini Ioannou, Odysseas Papapetrou, Dimitrios ...
ICIP
2002
IEEE
16 years 6 months ago
Learning a decision boundary for face detection
This paper describes a pattern classification approach for detecting frontal-view faces via learning a decision boundary. The classification can be achieved either by explicit est...
Tae-Kyun Kim, Donggeon Kong, Sang Ryong Kim
OTM
2007
Springer
15 years 10 months ago
Discovering Executable Semantic Mappings Between Ontologies
Creating executable semantic mappings is an important task for ontology-based information integration. Although it is argued that mapping tools may require interaction from humans ...
Han Qin, Dejing Dou, Paea LePendu