Sciweavers

960 search results - page 69 / 192
» There's no Data like More Data
Sort
View
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 10 months ago
A Spamicity Approach to Web Spam Detection
Web spam, which refers to any deliberate actions bringing to selected web pages an unjustifiable favorable relevance or importance, is one of the major obstacles for high quality ...
Bin Zhou 0002, Jian Pei, ZhaoHui Tang
COGSCI
2010
134views more  COGSCI 2010»
13 years 9 months ago
A Model of Knower-Level Behavior in Number Concept Development
We develop and evaluate a model of behavior on the Give-N task, a commonly used measure of young children's number knowledge. Our model uses the knower-level theory of how ch...
Michael D. Lee, Barbara W. Sarnecka
DPD
2002
125views more  DPD 2002»
13 years 8 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
FCCM
2011
IEEE
311views VLSI» more  FCCM 2011»
13 years 24 days ago
String Matching in Hardware Using the FM-Index
—String matching is a ubiquitous problem that arises in a wide range of applications in computing, e.g., packet routing, intrusion detection, web querying, and genome analysis. D...
Edward Fernandez, Walid Najjar, Stefano Lonardi
CIKM
2011
Springer
12 years 9 months ago
Structural link analysis and prediction in microblogs
With hundreds of millions of participants, social media services have become commonplace. Unlike a traditional social network service, a microblogging network like Twitter is a hy...
Dawei Yin, Liangjie Hong, Brian D. Davison