Sciweavers

KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 4 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
14 years 4 months ago
CP-summary: a concise representation for browsing frequent itemsets
Ardian Kristanto Poernomo, Vivekanand Gopalkrishna...
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 4 months ago
Parallel community detection on large networks with propinquity dynamics
Graphs or networks can be used to model complex systems. Detecting community structures from large network data is a classic and challenging task. In this paper, we propose a nove...
Yuzhou Zhang, Jianyong Wang, Yi Wang, Lizhu Zhou
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 4 months ago
A viewpoint-based approach for interaction graph analysis
Recent innovations have resulted in a plethora of social applications on the Web, such as blogs, social networks, and community photo and video sharing applications. Such applicat...
Sitaram Asur, Srinivasan Parthasarathy
KDD
2009
ACM
248views Data Mining» more  KDD 2009»
14 years 4 months ago
PSkip: estimating relevance ranking quality from web search clickthrough data
1 In this article, we report our efforts in mining the information encoded as clickthrough data in the server logs to evaluate and monitor the relevance ranking quality of a commer...
Kuansan Wang, Toby Walker, Zijian Zheng
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
14 years 4 months ago
Improving data mining utility with projective sampling
Overall performance of the data mining process depends not just on the value of the induced knowledge but also on various costs of the process itself such as the cost of acquiring...
Mark Last
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 4 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
KDD
2009
ACM
172views Data Mining» more  KDD 2009»
14 years 4 months ago
Learning dynamic temporal graphs for oil-production equipment monitoring system
Learning temporal graph structures from time series data reveals important dependency relationships between current observations and histories. Most previous work focuses on learn...
Yan Liu, Jayant R. Kalagnanam, Oivind Johnsen
KDD
2009
ACM
379views Data Mining» more  KDD 2009»
14 years 4 months ago
MetaFac: community discovery via relational hypergraph factorization
This paper aims at discovering community structure in rich media social networks, through analysis of time-varying, multi-relational data. Community structure represents the laten...
Yu-Ru Lin, Jimeng Sun, Paul Castro, Ravi B. Konuru...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 6 months ago
Ad quality on TV: predicting television audience retention
This paper explores the impact of television advertisements on audience retention using data collected from television set-top boxes (STBs)1 . In particular, we discuss how the ac...
Yannet Interian, Sundar Dorai-Raj, Igor Naverniouk...