Sciweavers

12272 search results - page 2334 / 2455
» Experimental program analysis
Sort
View
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 2 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
143
Voted
KDD
2006
ACM
179views Data Mining» more  KDD 2006»
16 years 2 months ago
Extracting key-substring-group features for text classification
In many text classification applications, it is appealing to take every document as a string of characters rather than a bag of words. Previous research studies in this area mostl...
Dell Zhang, Wee Sun Lee
KDD
2005
ACM
165views Data Mining» more  KDD 2005»
16 years 2 months ago
Co-clustering by block value decomposition
Dyadic data matrices, such as co-occurrence matrix, rating matrix, and proximity matrix, arise frequently in various important applications. A fundamental problem in dyadic data a...
Bo Long, Zhongfei (Mark) Zhang, Philip S. Yu
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 2 months ago
High-throughput Protein Interactome Data: Minable or Not?
There is an emerging trend in post-genome biology to study the collection of thousands of protein interaction pairs (protein interactome) derived from high-throughput experiments....
Jake Yue Chen, Andrey Y. Sivachenko, Lang Li
118
Voted
KDD
2004
ACM
163views Data Mining» more  KDD 2004»
16 years 2 months ago
Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods
We consider the problem of improving named entity recognition (NER) systems by using external dictionaries--more specifically, the problem of extending state-of-the-art NER system...
William W. Cohen, Sunita Sarawagi
« Prev « First page 2334 / 2455 Last » Next »