Sciweavers

15781 search results - page 3046 / 3157
» Evaluating Information Extraction
Sort
View
143
Voted
EDBT
2009
ACM
138views Database» more  EDBT 2009»
15 years 10 months ago
FOGGER: an algorithm for graph generator discovery
To our best knowledge, all existing graph pattern mining algorithms can only mine either closed, maximal or the complete set of frequent subgraphs instead of graph generators whic...
Zhiping Zeng, Jianyong Wang, Jun Zhang, Lizhu Zhou
126
Voted
GIS
2009
ACM
15 years 10 months ago
Trajectory simplification method for location-based social networking services
The increasing availabilities of GPS-enabled devices have given rise to the location-based social networking services (LBSN), in which users can record their travel experiences wi...
Yukun Chen, Kai Jiang, Yu Zheng, Chunping Li, Neng...
KDD
2009
ACM
160views Data Mining» more  KDD 2009»
15 years 10 months ago
Clustering event logs using iterative partitioning
The importance of event logs, as a source of information in systems and network management cannot be overemphasized. With the ever increasing size and complexity of today’s even...
Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangel...
137
Voted
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
15 years 10 months ago
Modeling and predicting user behavior in sponsored search
Implicit user feedback, including click-through and subsequent browsing behavior, is crucial for evaluating and improving the quality of results returned by search engines. Severa...
Josh Attenberg, Sandeep Pandey, Torsten Suel
SAS
2009
Springer
149views Formal Methods» more  SAS 2009»
15 years 10 months ago
Creating Transformations for Matrix Obfuscation
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transfo...
Stephen Drape, Irina Voiculescu
« Prev « First page 3046 / 3157 Last » Next »