Sciweavers

9886 search results - page 1936 / 1978
» Learning Compressible Models
Sort
View
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
16 years 3 months ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang
120
Voted
KDD
2004
ACM
163views Data Mining» more  KDD 2004»
16 years 3 months ago
Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods
We consider the problem of improving named entity recognition (NER) systems by using external dictionaries--more specifically, the problem of extending state-of-the-art NER system...
William W. Cohen, Sunita Sarawagi
128
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 3 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
101
Voted
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
16 years 3 months ago
The "DGX" distribution for mining massive, skewed data
Skewed distributions appear very often in practice. Unfortunately, the traditional Zipf distribution often fails to model them well. In this paper, we propose a new probability di...
Zhiqiang Bi, Christos Faloutsos, Flip Korn
116
Voted
HPCA
2008
IEEE
16 years 3 months ago
Automated microprocessor stressmark generation
Estimating the maximum power and thermal characteristics of a processor is essential for designing its power delivery system, packaging, cooling, and power/thermal management sche...
Ajay M. Joshi, Lieven Eeckhout, Lizy Kurian John, ...
« Prev « First page 1936 / 1978 Last » Next »