Sciweavers

7581 search results - page 1380 / 1517
» Incompleteness in Data Mining
Sort
View
153
Voted
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 10 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
ICPADS
2008
IEEE
15 years 10 months ago
Integrating Sensor Streams in pHealth Networks
Personal Health (pHealth) sensor networks are generally used to monitor the wellbeing of both athletes and the general public to inform health specialists of future and often seri...
Mark Roantree, Dónall McCann, Niall Moyna
DEEC
2007
IEEE
15 years 10 months ago
DeepBot: a focused crawler for accessing hidden web content
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICTAI
2007
IEEE
15 years 10 months ago
Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars
Context-sensitive graph grammar construction tools have been used to develop and study interesting languages. However, the high dimensionality of graph grammars result in costly e...
Keven Ates, Kang Zhang
« Prev « First page 1380 / 1517 Last » Next »