Sciweavers

766 search results - page 142 / 154
» Middleware for data mining applications on clusters and grid...
Sort
View
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 2 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 8 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
WWW
2008
ACM
14 years 8 months ago
Query-sets: using implicit feedback and query patterns to organize web documents
In this paper we present a new document representation model based on implicit user feedback obtained from search engine queries. The main objective of this model is to achieve be...
Barbara Poblete, Ricardo A. Baeza-Yates
SIGSOFT
2005
ACM
14 years 1 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
ICEIS
2000
IEEE
14 years 8 hour ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant