Sciweavers

2795 search results - page 196 / 559
» Recommended or Not
Sort
View
135
Voted
ESORICS
2010
Springer
15 years 4 months ago
Enforcing Secure Object Initialization in Java
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not followin...
Laurent Hubert, Thomas P. Jensen, Vincent Monfort,...
112
Voted
APIN
2005
107views more  APIN 2005»
15 years 3 months ago
Multi-Instance Learning Based Web Mining
In multi-instance learning, the training set comprises labeled bags that are composed of unlabeled instances, and the task is to predict the labels of unseen bags. In this paper, ...
Zhi-Hua Zhou, Kai Jiang, Ming Li
134
Voted
CACM
2000
186views more  CACM 2000»
15 years 3 months ago
Automatic personalization based on Web usage mining
One important class of Data Mining applications is the so-called "Web Mining" that analyzes and extracts important and non-trivial knowledge from Web related data. Typic...
Bamshad Mobasher, Robert Cooley, Jaideep Srivastav...
123
Voted
CORR
2002
Springer
97views Education» more  CORR 2002»
15 years 3 months ago
Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews
This paper presents a simple unsupervised learning algorithm for classifying reviews as recommended (thumbs up) or not recommended (thumbs down). The classification of a review is...
Peter D. Turney
121
Voted
PVLDB
2008
94views more  PVLDB 2008»
15 years 3 months ago
Dynamic active probing of helpdesk databases
Helpdesk databases are used to store past interactions between customers and companies to improve customer service quality. One common scenario of using helpdesk database is to fi...
Shenghuo Zhu, Tao Li, Zhiyuan Chen, Dingding Wang,...