Data stream clustering: A survey

JA Silva, ER Faria, RC Barros, ER Hruschka… - ACM Computing …, 2013 - dl.acm.org
Data stream mining is an active research area that has recently emerged to discover
knowledge from large amounts of continuously generated data. In this context, several data …

Efficient computation of frequent and top-k elements in data streams

A Metwally, D Agrawal, A El Abbadi - International conference on …, 2005 - Springer
We propose an integrated approach for solving both problems of finding the most popular k
elements, and finding frequent elements in a data stream. Our technique is efficient and …

The dark side of the Internet: Attacks, costs and responses

W Kim, OR Jeong, C Kim, J So - Information systems, 2011 - Elsevier
The Internet and Web technologies have originally been developed assuming an ideal
world where all users are honorable. However, the dark side has emerged and bedeviled …

Madfraud: Investigating ad fraud in android applications

J Crussell, R Stevens, H Chen - Proceedings of the 12th annual …, 2014 - dl.acm.org
Many Android applications are distributed for free but are supported by advertisements. Ad
libraries embedded in the app fetch content from the ad provider and display it on the app's …

Method and system for duplicate check detection

MM Anderson - US Patent 8,391,584, 2013 - Google Patents
US8391584B2 - Method and system for duplicate check detection - Google Patents
US8391584B2 - Method and system for duplicate check detection - Google Patents Method and …

A taxonomy of frauds and fraud detection techniques

N Laleh, M Abdollahi Azgomi - … , ICISTM 2009, Ghaziabad, India, March 12 …, 2009 - Springer
Fraud is growing noticeably with the expansion of modern technology and the universal
superhighways of communication, resulting in the loss of billions of dollars worldwide each …

The dark alleys of madison avenue: Understanding malicious advertisements

A Zarras, A Kapravelos, G Stringhini, T Holz… - Proceedings of the …, 2014 - dl.acm.org
Online advertising drives the economy of the World Wide Web. Modern websites of any size
and popularity include advertisements to monetize visits from their users. To this end, they …

Tight bounds for lp samplers, finding duplicates in streams, and related problems

H Jowhari, M Sağlam, G Tardos - … of the thirtieth ACM SIGMOD-SIGACT …, 2011 - dl.acm.org
In this paper, we present near-optimal space bounds for Lp-samplers. Given a stream of
updates (additions and subtraction) to the coordinates of an underlying vector x in Rn, a …

Approximately detecting duplicates for streaming data using stable bloom filters

F Deng, D Rafiei - Proceedings of the 2006 ACM SIGMOD international …, 2006 - dl.acm.org
Traditional duplicate elimination techniques are not applicable to many data stream
applications. In general, precisely eliminating duplicates in an unbounded data stream is not …

Understanding fraudulent activities in online ad exchanges

B Stone-Gross, R Stevens, A Zarras… - Proceedings of the …, 2011 - dl.acm.org
Online advertisements (ads) provide a powerful mechanism for advertisers to effectively
target Web users. Ads can be customized based on a user's browsing behavior, geographic …