Sciweavers

ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
13 years 11 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
13 years 11 months ago
A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks
This paper offers a local distributed algorithm for expectation maximization in large peer-to-peer environments. The algorithm can be used for a variety of well-known data mining...
Kanishka Bhaduri, Ashok N. Srivastava
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
13 years 11 months ago
Scalable Algorithms for Distribution Search
Distribution data naturally arise in countless domains, such as meteorology, biology, geology, industry and economics. However, relatively little attention has been paid to data m...
Yasuko Matsubara, Yasushi Sakurai, Masatoshi Yoshi...
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
13 years 11 months ago
Regression Learning Vector Quantization
— Learning Vector Quantization (LVQ) is a popular class of nearest prototype classifiers for multiclass classification. Learning algorithms from this family are widely used becau...
Mihajlo Grbovic, Slobodan Vucetic
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
13 years 11 months ago
Accurate Estimation of the Degree Distribution of Private Networks
—We describe an efficient algorithm for releasing a provably private estimate of the degree distribution of a network. The algorithm satisfies a rigorous property of differenti...
Michael Hay, Chao Li, Gerome Miklau, David Jensen
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
13 years 11 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi
ICDM
2009
IEEE
139views Data Mining» more  ICDM 2009»
13 years 11 months ago
A Bootstrap Approach to Eigenvalue Correction
—Eigenvalue analysis is an important aspect in many data modeling methods. Unfortunately, the eigenvalues of the sample covariance matrix (sample eigenvalues) are biased estimate...
Anne Hendrikse, Luuk J. Spreeuwers, Raymond N. J. ...
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
13 years 11 months ago
Discovering Excitatory Networks from Discrete Event Streams with Applications to Neuronal Spike Train Analysis
—Mining temporal network models from discrete event streams is an important problem with applications in computational neuroscience, physical plant diagnostics, and human-compute...
Debprakash Patnaik, Srivatsan Laxman, Naren Ramakr...
ICDM
2009
IEEE
109views Data Mining» more  ICDM 2009»
13 years 11 months ago
Knowledge Discovery from Citation Networks
—Knowledge discovery from scientific articles has received increasing attentions recently since huge repositories are made available by the development of the Internet and digit...
Zhen Guo, Zhongfei Zhang, Shenghuo Zhu, Yun Chi, Y...
ICDM
2009
IEEE
105views Data Mining» more  ICDM 2009»
13 years 11 months ago
Multi-document Summarization by Information Distance
—We are now living in a world where information is growing and updating quickly. Knowledge can be acquired more efficiently with the help of automatic document summarization and...
Chong Long, Minlie Huang, Xiaoyan Zhu, Ming Li