Sciweavers

188 search results - page 38 / 38
» Quantification of a Privacy Preserving Data Mining Transform...
Sort
View
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 4 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
WSDM
2010
ACM
204views Data Mining» more  WSDM 2010»
13 years 10 months ago
Learning URL patterns for webpage de-duplication
Presence of duplicate documents in the World Wide Web adversely affects crawling, indexing and relevance, which are the core building blocks of web search. In this paper, we pres...
Hema Swetha Koppula, Krishna P. Leela, Amit Agarwa...
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
14 years 3 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi