Sciweavers

2084 search results - page 317 / 417
» Knowledge Exploitation from the Web
Sort
View
CORR
2008
Springer
126views Education» more  CORR 2008»
13 years 9 months ago
Mining User Profiles to Support Structure and Explanation in Open Social Networking
The proliferation of media sharing and social networking websites has brought with it vast collections of site-specific user generated content. The result is a Social Networking Di...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
14 years 9 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 3 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
FLAIRS
2004
13 years 10 months ago
An Application of Neural Networks to Sequence Analysis and Genre Identification
This study borrowed sequence analysis techniques from the genetic sciences and applied them to a similar problem in email filtering and web searching. Genre identification is the ...
David Bisant
ICCBR
2009
Springer
13 years 7 months ago
Constraint-Based Case-Based Planning Using Weighted MAX-SAT
Previous approaches to case-based planning often finds a similar plan case to a new planning problem to adapt to solve the new problem. However, in the case base, there may be some...
Hankui Zhuo, Qiang Yang, Lei Li