Sciweavers

172 search results - page 32 / 35
» Spam Filtering using Spam Mail Communities
Sort
View
TREC
2007
13 years 8 months ago
Experiments in TREC 2007 Blog Opinion Task at CAS-ICT
This paper describes our participation in TREC 2007 Blog Track Tasks: Opinion retrieval and Polarity classification. As for Opinion retrieval task, a two-step approach is used to ...
Xiangwen Liao, Donglin Cao, Yu Wang 0009, Wei Liu,...
HICSS
2010
IEEE
258views Biometrics» more  HICSS 2010»
13 years 7 months ago
An Empirical Comparison of Four Text Mining Methods
The amount of textual data that is available for researchers and businesses to analyze is increasing at a dramatic rate. This reality has led IS researchers to investigate various...
Sangno Lee, Jeff Baker, Jaeki Song, James C. Wethe...
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 1 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
14 years 7 months ago
Practical learning from one-sided feedback
In many data mining applications, online labeling feedback is only available for examples which were predicted to belong to the positive class. Such applications include spam filt...
D. Sculley
WWW
2006
ACM
14 years 8 months ago
Detecting semantic cloaking on the web
By supplying different versions of a web page to search engines and to browsers, a content provider attempts to cloak the real content from the view of the search engine. Semantic...
Baoning Wu, Brian D. Davison