Sciweavers

8614 search results - page 1486 / 1723
» Mining
Sort
View
151
Voted
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 10 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
148
Voted
ICDIM
2008
IEEE
15 years 10 months ago
Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledge
The domain of Digital Libraries presents specific challenges for unsupervised information extraction to support both the automatic classification of documents and the enhancement ...
Mikalai Krapivin, Maurizio Marchese, Andrei Yadran...
152
Voted
ICEIS
2008
IEEE
15 years 10 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
102
Voted
ICPADS
2008
IEEE
15 years 10 months ago
Integrating Sensor Streams in pHealth Networks
Personal Health (pHealth) sensor networks are generally used to monitor the wellbeing of both athletes and the general public to inform health specialists of future and often seri...
Mark Roantree, Dónall McCann, Niall Moyna
115
Voted
ICPR
2008
IEEE
15 years 10 months ago
Three related types of multi-value association patterns
Mining patterns involving multiple values that are significantly relevant is a difficult but very important problem that crosses many disciplines. Multi-value association patterns...
Thomas W. H. Lui, David K. Y. Chiu
« Prev « First page 1486 / 1723 Last » Next »