Sciweavers

406 search results - page 58 / 82
» Dominating Sets in Web Graphs
Sort
View
ASIACRYPT
2010
Springer
13 years 7 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
FSKD
2009
Springer
145views Fuzzy Logic» more  FSKD 2009»
14 years 3 months ago
Chinese Web Comments Clustering Analysis with a Two-phase Method
Usually a meaningful web topic has tens of thousands of comments, especially the hot topics. It is valuable if we congregate the comments into clusters and find out the mainstrea...
Yexin Wang, Li Zhao, Yan Zhang
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
14 years 9 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
WIRI
2005
IEEE
14 years 2 months ago
Collaborative Filtering by Mining Association Rules from User Access Sequences
Recent research in mining user access patterns for predicting Web page requests focuses only on consecutive sequential Web page accesses, i.e., pages which are accessed by followi...
Mei-Ling Shyu, Choochart Haruechaiyasak, Shu-Ching...
WWW
2005
ACM
14 years 9 months ago
Identifying link farm spam pages
With the increasing importance of search in guiding today's web traffic, more and more effort has been spent to create search engine spam. Since link analysis is one of the m...
Baoning Wu, Brian D. Davison