Sciweavers

SDM
2008
SIAM
168views Data Mining» more  SDM 2008»
13 years 6 months ago
Semi-Supervised Clustering via Matrix Factorization
The recent years have witnessed a surge of interests of semi-supervised clustering methods, which aim to cluster the data set under the guidance of some supervisory information. U...
Fei Wang, Tao Li, Changshui Zhang
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
13 years 6 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
SDM
2008
SIAM
114views Data Mining» more  SDM 2008»
13 years 6 months ago
Semi-Supervised Classification with Universum
The Universum data, defined as a collection of "nonexamples" that do not belong to any class of interest, have been shown to encode some prior knowledge by representing ...
Dan Zhang, Jingdong Wang, Fei Wang, Changshui Zhan...
SDM
2008
SIAM
122views Data Mining» more  SDM 2008»
13 years 6 months ago
Type-Independent Correction of Sample Selection Bias via Structural Discovery and Re-balancing
Sample selection bias is a common problem in many real world applications, where training data are obtained under realistic constraints that make them follow a different distribut...
Jiangtao Ren, Xiaoxiao Shi, Wei Fan, Philip S. Yu
SDM
2008
SIAM
95views Data Mining» more  SDM 2008»
13 years 6 months ago
Deterministic Latent Variable Models and Their Pitfalls
We derive a number of well known deterministic latent variable models such as PCA, ICA, EPCA, NMF and PLSA as variational EM approximations with point posteriors. We show that the...
Max Welling, Chaitanya Chemudugunta, Nathan Sutter
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 6 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
SDM
2008
SIAM
113views Data Mining» more  SDM 2008»
13 years 6 months ago
Randomization of real-valued matrices for assessing the significance of data mining results
Markus Ojala, Niko Vuokko, Aleksi Kallio, Niina Ha...
SDM
2008
SIAM
124views Data Mining» more  SDM 2008»
13 years 6 months ago
Mining Association Rules of Simple Conjunctive Queries
Bart Goethals, Wim Le Page, Heikki Mannila
SDM
2008
SIAM
136views Data Mining» more  SDM 2008»
13 years 6 months ago
Exploration and Reduction of the Feature Space by Hierarchical Clustering
In this paper we propose and test the use of hierarchical clustering for feature selection. The clustering method is Ward's with a distance measure based on GoodmanKruskal ta...
Dino Ienco, Rosa Meo
SDM
2008
SIAM
121views Data Mining» more  SDM 2008»
13 years 6 months ago
Integration of Multiple Networks for Robust Label Propagation
Transductive inference on graphs such as label propagation algorithms is receiving a lot of attention. In this paper, we address a label propagation problem on multiple networks a...
Tsuyoshi Kato, Hisashi Kashima, Masashi Sugiyama