Sciweavers

580 search results - page 2 / 116
» Using Data Mining Methods to Predict Personally Identifiable...
Sort
View
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
13 years 12 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
SIGIR
2009
ACM
13 years 11 months ago
Identifying the original contribution of a document via language modeling
Abstract. One major goal of text mining is to provide automatic methods to help humans grasp the key ideas in ever-increasing text corpora. To this effect, we propose a statistica...
Benyah Shaparenko, Thorsten Joachims
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
14 years 5 months ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang
ADMA
2009
Springer
105views Data Mining» more  ADMA 2009»
13 years 8 months ago
Mining User Position Log for Construction of Personalized Activity Map
Consider a scenario in which a smart phone automatically saves the user’s positional records for personalized location-based applications. The smart phone will infer patterns of ...
Hui Fang, Wen-Jing Hsu, Larry Rudolph
ISSTA
2009
ACM
13 years 11 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...