Sciweavers

2084 search results - page 62 / 417
» Knowledge Exploitation from the Web
Sort
View
IRI
2005
IEEE
14 years 4 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
JMLR
2012
12 years 24 days ago
Exploiting Unrelated Tasks in Multi-Task Learning
We study the problem of learning a group of principal tasks using a group of auxiliary tasks, unrelated to the principal ones. In many applications, joint learning of unrelated ta...
Bernardino Romera-Paredes, Andreas Argyriou, Nadia...
WWW
2009
ACM
14 years 11 months ago
Search shortcuts: driving users towards their goals
Giving suggestions to users of Web-based services is a common practice aimed at enhancing their navigation experience. Major Web Search Engines usually provide Suggestions under t...
Ranieri Baraglia, Fidel Cacheda, Victor Carneiro, ...
ESWS
2005
Springer
14 years 3 months ago
Dually Structured Concepts in the Semantic Web: Answer Set Programming Approach
There is an ongoing discussion whether reasoning in the Semantic Web should be monotonic or not. It seems however that the problem concerns not only the reasoning over knowledge bu...
Patryk Burek, Rafal Grabos
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 10 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham