Sciweavers

159 search results - page 16 / 32
» Knowledge Discovery from Citation Networks
Sort
View
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
ICML
2009
IEEE
14 years 4 months ago
Topic-link LDA: joint models of topic and author community
Given a large-scale linked document collection, such as a collection of blog posts or a research literature archive, there are two fundamental problems that have generated a lot o...
Yan Liu, Alexandru Niculescu-Mizil, Wojciech Gryc
AINA
2010
IEEE
14 years 2 months ago
Developing Distributed Reasoning-Based Applications for the Semantic Web
—In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning cons...
Dimitrios A. Koutsomitropoulos, Georgia D. Solomou...
CMG
2001
13 years 11 months ago
Effective Use of the KDD Process and Data Mining for Computer Performance Professionals
- The KDD (Knowledge Discovery in Databases) paradigm is a step by step process for finding interesting patterns in large amounts of data. Data mining is one step in the process. T...
Susan P. Imberman
KDD
2006
ACM
157views Data Mining» more  KDD 2006»
14 years 10 months ago
Using structure indices for efficient approximation of network properties
Statistics on networks have become vital to the study of relational data drawn from areas such as bibliometrics, fraud detection, bioinformatics, and the Internet. Calculating man...
Matthew J. Rattigan, Marc Maier, David Jensen