Sciweavers

1968 search results - page 315 / 394
» Japanese Information Extraction with Automatically Extracted...
Sort
View
91
Voted
WWW
2009
ACM
16 years 3 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
KDD
2006
ACM
175views Data Mining» more  KDD 2006»
16 years 2 months ago
A mixture model for contextual text mining
Contextual text mining is concerned with extracting topical themes from a text collection with context information (e.g., time and location) and comparing/analyzing the variations...
Qiaozhu Mei, ChengXiang Zhai
SIGMOD
2005
ACM
135views Database» more  SIGMOD 2005»
16 years 2 months ago
Mining data streams: a review
The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously an...
Mohamed Medhat Gaber, Arkady B. Zaslavsky, Shonali...
105
Voted
WWW
2010
ACM
15 years 9 months ago
Scalable discovery of contradictions on the web
Our study addresses the problem of large-scale contradiction detection and management, from data extracted from the Web. We describe the first systematic solution to the problem,...
Mikalai Tsytsarau, Themis Palpanas, Kerstin Deneck...
147
Voted
DOLAP
2009
ACM
15 years 9 months ago
A taxonomy of ETL activities
Extract-Transform-Load (ETL) activities are software modules responsible for populating a data warehouse with operational data, which have undergone a series of transformations on...
Panos Vassiliadis, Alkis Simitsis, Eftychia Baikou...