Sciweavers

7053 search results - page 1392 / 1411
» Data Mining
Sort
View
121
Voted
IMC
2006
ACM
15 years 8 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
105
Voted
SAC
2005
ACM
15 years 8 months ago
Automatic extraction of informative blocks from webpages
Search engines crawl and index webpages depending upon their informative content. However, webpages — especially dynamically generated ones — contain items that cannot be clas...
Sandip Debnath, Prasenjit Mitra, C. Lee Giles
130
Voted
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
15 years 8 months ago
Constructive induction and genetic algorithms for learning concepts with complex interaction
Constructive Induction is the process of transforming the original representation of hard concepts with complex interaction into a representation that highlights regularities. Mos...
Leila Shila Shafti, Eduardo Pérez
111
Voted
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 8 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
113
Voted
GFKL
2005
Springer
167views Data Mining» more  GFKL 2005»
15 years 8 months ago
Quantitative Text Typology: The Impact of Sentence Length
Abstract. This study focuses on the contribution of sentence length for a quantitative text typology. Therefore, 333 Slovenian texts are analyzed with regard to their sentence leng...
Emmerich Kelih, Peter Grzybek, Gordana Antic, Erns...
« Prev « First page 1392 / 1411 Last » Next »