Sciweavers

7053 search results - page 1392 / 1411
» Data Mining
Sort
View
IMC
2006
ACM
14 years 4 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
SAC
2005
ACM
14 years 4 months ago
Automatic extraction of informative blocks from webpages
Search engines crawl and index webpages depending upon their informative content. However, webpages — especially dynamically generated ones — contain items that cannot be clas...
Sandip Debnath, Prasenjit Mitra, C. Lee Giles
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
14 years 4 months ago
Constructive induction and genetic algorithms for learning concepts with complex interaction
Constructive Induction is the process of transforming the original representation of hard concepts with complex interaction into a representation that highlights regularities. Mos...
Leila Shila Shafti, Eduardo Pérez
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
14 years 4 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
GFKL
2005
Springer
167views Data Mining» more  GFKL 2005»
14 years 4 months ago
Quantitative Text Typology: The Impact of Sentence Length
Abstract. This study focuses on the contribution of sentence length for a quantitative text typology. Therefore, 333 Slovenian texts are analyzed with regard to their sentence leng...
Emmerich Kelih, Peter Grzybek, Gordana Antic, Erns...
« Prev « First page 1392 / 1411 Last » Next »