-
1
-
-
52649126036
-
Finding hidden group structure in a stream of communications
-
J. Baumes, M. Goldberg, M. Hayvanovych. M. Magdon-Ismail, W. Wallace, and M. J. Zaki. Finding hidden group structure in a stream of communications. In ISI. 2006.
-
(2006)
ISI
-
-
Baumes, J.1
Goldberg, M.2
Hayvanovych, M.3
Magdon-Ismail, M.4
Wallace, W.5
Zaki, M.J.6
-
2
-
-
77954235092
-
A survey on pagerank computing
-
P. Berkhin. A survey on pagerank computing. Internet Mathematics, 2(1):73-120, 2005.
-
(2005)
Internet Mathematics
, vol.2
, Issue.1
, pp. 73-120
-
-
Berkhin, P.1
-
3
-
-
21144438169
-
An improved data stream summary: The count-min sketch and its applications
-
G. Cormode and S. Muthukrishnan. An improved data stream summary: The count-min sketch and its applications. In LATIN, 2004.
-
(2004)
LATIN
-
-
Cormode, G.1
Muthukrishnan, S.2
-
4
-
-
23044525410
-
Signature-based methods for data streams
-
C. Cortes and D. Pregibon. Signature-based methods for data streams. Data Min. Knowl. Discov., 5(3): 167-182, 2001.
-
(2001)
Data Min. Knowl. Discov
, vol.5
, Issue.3
, pp. 167-182
-
-
Cortes, C.1
Pregibon, D.2
-
6
-
-
0002656796
-
Activity monitoring: Noticing interesting changes in behavior
-
T. Fawcett and F. Provost. Activity monitoring: Noticing interesting changes in behavior. In SIGKDD, 1999.
-
(1999)
SIGKDD
-
-
Fawcett, T.1
Provost, F.2
-
8
-
-
33745630997
-
Discovering large dense subgraphs in massive graphs
-
D. Gibson, R. Kumar, and A. Tomkins. Discovering large dense subgraphs in massive graphs. In VLDB, 2005.
-
(2005)
VLDB
-
-
Gibson, D.1
Kumar, R.2
Tomkins, A.3
-
9
-
-
77953061730
-
-
T. H. Haveliwala. Topic-sensitive pagerank. In WWW, 2002.
-
T. H. Haveliwala. Topic-sensitive pagerank. In WWW, 2002.
-
-
-
-
10
-
-
33749672582
-
-
S. Hill, D. Agarwal, R. Bell, and C. Volinsky. Building an effective representation for dynamic network. Computational and Graphical Statistics. 15(3):584-608(25), 2006.
-
S. Hill, D. Agarwal, R. Bell, and C. Volinsky. Building an effective representation for dynamic network. Computational and Graphical Statistics. 15(3):584-608(25), 2006.
-
-
-
-
11
-
-
33749590685
-
The myth of the double-blind review? Author identification using only citations
-
S. Hill and F. Provost. The myth of the double-blind review? Author identification using only citations. SIGKDD Explorations. 5(2):179-184, 2003.
-
(2003)
SIGKDD Explorations
, vol.5
, Issue.2
, pp. 179-184
-
-
Hill, S.1
Provost, F.2
-
12
-
-
33748544940
-
Network-based marketing: Identifying likely adopters via consumer networks
-
S. Hill, F. Provost, and C. Volinsky. Network-based marketing: Identifying likely adopters via consumer networks. Statistical Science. 21(2):256-276, 2006.
-
(2006)
Statistical Science
, vol.21
, Issue.2
, pp. 256-276
-
-
Hill, S.1
Provost, F.2
Volinsky, C.3
-
14
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
P. Indyk, and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In STOC, 1998.
-
(1998)
STOC
-
-
Indyk, P.1
Motwani, R.2
-
17
-
-
0020344505
-
Areas beneath the relative operating characteristics (ROC) and relative operating levels (ROL) curves: Statistical significance and interpretation
-
S. Mason and N. Graham. Areas beneath the relative operating characteristics (ROC) and relative operating levels (ROL) curves: Statistical significance and interpretation. Q. J. R. Meteorol. Soc. 30:291-303, 1982.
-
(1982)
Q. J. R. Meteorol. Soc
, vol.30
, pp. 291-303
-
-
Mason, S.1
Graham, N.2
-
18
-
-
85081774740
-
Enterprise security: A community of interest based approach
-
P. McDaniel, S. Sen, O. Spatscheck, J. van der Merwe, B. Aiello, and C. Kalmanek. Enterprise security: A community of interest based approach. In NDSS, 2006.
-
(2006)
NDSS
-
-
McDaniel, P.1
Sen, S.2
Spatscheck, O.3
van der Merwe, J.4
Aiello, B.5
Kalmanek, C.6
-
20
-
-
84871993728
-
-
Cisco netflow. http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/ tech/napps_wp.htm.
-
Cisco netflow
-
-
-
22
-
-
12244268431
-
Graph-based anomaly detection
-
C. Noble and D. Cook. Graph-based anomaly detection. In SIGKDD, 2003.
-
(2003)
SIGKDD
-
-
Noble, C.1
Cook, D.2
-
23
-
-
19944400484
-
-
J. Novak, P. Raghavan, and A. Tomkins. Anti-aliasing on the web. In WWW, 2004.
-
J. Novak, P. Raghavan, and A. Tomkins. Anti-aliasing on the web. In WWW, 2004.
-
-
-
-
24
-
-
26544457660
-
User recognition by keystroke latency pattern analysis
-
Technical Report
-
D. Song, P. Venable, and A. Perrig. User recognition by keystroke latency pattern analysis. Technical Report. 1997.
-
(1997)
-
-
Song, D.1
Venable, P.2
Perrig, A.3
-
25
-
-
33749416395
-
Relevance search and anomaly detection in bipartite graphs
-
J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos. Relevance search and anomaly detection in bipartite graphs. SIGKDD Explorations Special Issue on Link Mining. 7(2):48-55, 2005.
-
(2005)
SIGKDD Explorations Special Issue on Link Mining
, vol.7
, Issue.2
, pp. 48-55
-
-
Sun, J.1
Qu, H.2
Chakrabarti, D.3
Faloutsos, C.4
-
26
-
-
36949011812
-
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt and T. Wobber How Dynamic are IP Addresses In SIGCOMM, 2007.
-
(2007)
How Dynamic are IP Addresses In SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
27
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
K. Xu, Z. Zhang, and S. Bhattacharyya. Profiling internet backbone traffic: behavior models and applications. SIGCOMM Comput. Commun. Rev., 35(4):169-180, 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev
, vol.35
, Issue.4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
|