Sciweavers

2990 search results - page 516 / 598
» Thresholding for Change Detection
Sort
View
CIKM
2009
Springer
14 years 1 months ago
Ensembles in adversarial classification for spam
The standard method for combating spam, either in email or on the web, is to train a classifier on manually labeled instances. As the spammers change their tactics, the performanc...
Deepak Chinavle, Pranam Kolari, Tim Oates, Tim Fin...
WWW
2010
ACM
14 years 1 months ago
Time is of the essence: improving recency ranking using Twitter data
Realtime web search refers to the retrieval of very fresh content which is in high demand. An effective portal web search engine must support a variety of search needs, including ...
Anlei Dong, Ruiqiang Zhang, Pranam Kolari, Jing Ba...
APGV
2010
ACM
242views Visualization» more  APGV 2010»
14 years 1 months ago
The perception of finger motions
In this paper, we explore the perception of finger motions of virtual characters. In three experiments, designed to investigate finger animations, we asked the following questio...
Sophie Jörg, Jessica K. Hodgins, Carol O'Sull...
ICDCS
2010
IEEE
14 years 1 months ago
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
—Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-andcontrol. Despite the commonality of their substrates, we show that the different g...
Ting-Fang Yen, Michael K. Reiter
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
14 years 1 months ago
Mining top-k frequent items in a data stream with flexible sliding windows
We study the problem of finding the k most frequent items in a stream of items for the recently proposed max-frequency measure. Based on the properties of an item, the maxfrequen...
Hoang Thanh Lam, Toon Calders