Sciweavers

7150 search results - page 1102 / 1430
» Graph-Based Data Mining
Sort
View
AUSDM
2008
Springer
237views Data Mining» more  AUSDM 2008»
15 years 4 months ago
On Inconsistencies in Quantifying Strength of Community Structures
Complex network analysis involves the study of the properties of various real world networks. In this broad field, research on community structures forms an important sub area. Th...
Wen Haw Chong
127
Voted
AUSDM
2008
Springer
211views Data Mining» more  AUSDM 2008»
15 years 4 months ago
LBR-Meta: An Efficient Algorithm for Lazy Bayesian Rules
LBR is a highly accurate classification algorithm, which lazily constructs a single Bayesian rule for each test instance at classification time. However, its computational complex...
Zhipeng Xie
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 4 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
CIKM
2008
Springer
15 years 4 months ago
Web-scale named entity recognition
Automatic recognition of named entities such as people, places, organizations, books, and movies across the entire web presents a number of challenges, both of scale and scope. Da...
Casey Whitelaw, Alexander Kehlenbeck, Nemanja Petr...
KDD
2010
ACM
265views Data Mining» more  KDD 2010»
15 years 4 months ago
Scalable influence maximization for prevalent viral marketing in large-scale social networks
Influence maximization, defined by Kempe, Kleinberg, and Tardos (2003), is the problem of finding a small set of seed nodes in a social network that maximizes the spread of influe...
Wei Chen, Chi Wang, Yajun Wang
« Prev « First page 1102 / 1430 Last » Next »