Sciweavers

3651 search results - page 653 / 731
» Data Mining for Security Applications
Sort
View
JNCA
2008
104views more  JNCA 2008»
13 years 11 months ago
Computing in social networks with relationship algebra
Communities are the latest phenomena on the Internet. At the heart of each community lies a social network. In this paper, we show a generalized framework to understand and reason...
Javed I. Khan, Sajid S. Shaikh
JMLR
2006
131views more  JMLR 2006»
13 years 11 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser
ML
2000
ACM
244views Machine Learning» more  ML 2000»
13 years 11 months ago
Learnable Evolution Model: Evolutionary Processes Guided by Machine Learning
A new class of evolutionary computation processes is presented, called Learnable Evolution Model or LEM. In contrast to Darwinian-type evolution that relies on mutation, recombinat...
Ryszard S. Michalski
CIKM
2010
Springer
13 years 9 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
GIS
2010
ACM
13 years 9 months ago
Finding similar users using category-based location history
In this paper, we aim to estimate the similarity between users according to their GPS trajectories. Our approach first models a user’s GPS trajectories with a semantic location ...
Xiangye Xiao, Yu Zheng, Qiong Luo, Xing Xie