Sciweavers

3196 search results - page 488 / 640
» Knowledge Acquisition for Knowledge Management
Sort
View
WWW
2007
ACM
14 years 9 months ago
Construction by linking: the linkbase method
The success of many innovative Web applications is not based on the content they produce ? but on how they combine and link existing content. Older Web Engineering methods lack fl...
Johannes Meinecke, Frederic Majer, Martin Gaedke
KDD
2008
ACM
110views Data Mining» more  KDD 2008»
14 years 9 months ago
Mining preferences from superior and inferior examples
Mining user preferences plays a critical role in many important applications such as customer relationship management (CRM), product and service recommendation, and marketing camp...
Bin Jiang, Jian Pei, Xuemin Lin, David W. Cheung, ...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
KDD
2003
ACM
128views Data Mining» more  KDD 2003»
14 years 9 months ago
Similarity analysis on government regulations
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
EUROSYS
2008
ACM
14 years 6 months ago
Task activity vectors: a new metric for temperature-aware scheduling
Non-uniform utilization of functional units in combination with hardware mechanisms such as clock gating leads to different power consumptions in different parts of a processor ch...
Andreas Merkel, Frank Bellosa