Sciweavers

3088 search results - page 508 / 618
» Online Passive-Aggressive Algorithms
Sort
View
WWW
2005
ACM
14 years 10 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...
WWW
2004
ACM
14 years 10 months ago
Optimization of html automatically generated by wysiwyg programs
Automatically generated HTML, as produced by WYSIWYG programs, typically contains much repetitive and unnecessary markup. This paper identifies aspects of such HTML that may be al...
Jacqueline Spiesser, Les Kitchen
KDD
2009
ACM
141views Data Mining» more  KDD 2009»
14 years 9 months ago
Meme-tracking and the dynamics of the news cycle
Tracking new topics, ideas, and "memes" across the Web has been an issue of considerable interest. Recent work has developed methods for tracking topic shifts over long ...
Jure Leskovec, Lars Backstrom, Jon M. Kleinberg
KDD
2009
ACM
183views Data Mining» more  KDD 2009»
14 years 9 months ago
OLAP on search logs: an infrastructure supporting data-driven applications in search engines
Search logs, which contain rich and up-to-date information about users' needs and preferences, have become a critical data source for search engines. Recently, more and more ...
Bin Zhou 0002, Daxin Jiang, Jian Pei, Hang Li
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
14 years 9 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan