Sciweavers

ICDM
2006
IEEE
129views Data Mining» more  ICDM 2006»
13 years 10 months ago
Getting the Most Out of Ensemble Selection
We investigate four previously unexplored aspects of ensemble selection, a procedure for building ensembles of classifiers. First we test whether adjusting model predictions to p...
Rich Caruana, Art Munson, Alexandru Niculescu-Mizi...
ICDM
2006
IEEE
119views Data Mining» more  ICDM 2006»
13 years 10 months ago
Direct Marketing When There Are Voluntary Buyers
1 In traditional direct marketing, the implicit assumption is that customers will only purchase the product if they are contacted. In real business environments, however, there ar...
Yi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason...
ICDM
2006
IEEE
183views Data Mining» more  ICDM 2006»
13 years 10 months ago
Accelerating Newton Optimization for Log-Linear Models through Feature Redundancy
— Log-linear models are widely used for labeling feature vectors and graphical models, typically to estimate robust conditional distributions in presence of a large number of pot...
Arpit Mathur, Soumen Chakrabarti
ICDM
2006
IEEE
225views Data Mining» more  ICDM 2006»
13 years 10 months ago
Adaptive Kernel Principal Component Analysis with Unsupervised Learning of Kernels
Choosing an appropriate kernel is one of the key problems in kernel-based methods. Most existing kernel selection methods require that the class labels of the training examples ar...
Daoqiang Zhang, Zhi-Hua Zhou, Songcan Chen
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
13 years 10 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
13 years 10 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
13 years 10 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
ICDM
2006
IEEE
116views Data Mining» more  ICDM 2006»
13 years 10 months ago
Entity Resolution with Markov Logic
Entity resolution is the problem of determining which records in a database refer to the same entities, and is a crucial and expensive step in the data mining process. Interest in...
Parag Singla, Pedro Domingos