Sciweavers

775 search results - page 41 / 155
» Email data cleaning
Sort
View
IEEECIT
2010
IEEE
13 years 8 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
ICDT
2007
ACM
114views Database» more  ICDT 2007»
14 years 4 months ago
Axiomatizing the Logical Core of XPath 2.0
The first aim of this paper is to present the logical core of XPath 2.0: a logically clean, decidable fragment, which includes most navigational features of XPath 2.0 (complex co...
Balder ten Cate, Maarten Marx
KDD
2009
ACM
203views Data Mining» more  KDD 2009»
14 years 10 months ago
Characterizing individual communication patterns
The increasing availability of electronic communication data, such as that arising from e-mail exchange, presents social and information scientists with new possibilities for char...
R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amara...
SIGMOD
1999
ACM
135views Database» more  SIGMOD 1999»
14 years 2 months ago
Improving OLTP Data Quality Using Data Warehouse Mechanisms
Research and products for the integration of heterogeneous legacy source databases in data warehousing have addressed numerous data quality problems in or between the sources. Suc...
Matthias Jarke, Christoph Quix, Guido Blees, Dirk ...
IDEAL
2005
Springer
14 years 3 months ago
Probabilistic Data Generation for Deduplication and Data Linkage
Abstract. In many data mining projects the data to be analysed contains personal information, like names and addresses. Cleaning and preprocessing of such data likely involves dedu...
Peter Christen