Sciweavers

2705 search results - page 504 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
WWW
2004
ACM
14 years 8 months ago
An automatic semantic relationships discovery approach
An important obstacle to the success of the Semantic Web is that the establishment of the semantic relationship is labor-intensive. This paper proposes an automatic semantic relat...
Hai Zhuge, Liping Zheng, Nan Zhang 0007, Xiang Li
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
14 years 5 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
IEAAIE
2009
Springer
14 years 2 months ago
Robust Singular Spectrum Transform
Change Point Discovery is a basic algorithm needed in many time series mining applications including rule discovery, motif discovery, casual analysis, etc. Several techniques for c...
Yasser F. O. Mohammad, Toyoaki Nishida
PETRA
2009
ACM
14 years 2 months ago
Towards automated large vocabulary gesture search
This paper describes work towards designing a computer vision system for helping users look up the meaning of a sign. Sign lookup is treated as a video database retrieval problem....
Alexandra Stefan, Haijing Wang, Vassilis Athitsos
ICEIS
2008
IEEE
14 years 2 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya