Sciweavers

Share
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
10 years 6 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
SDM
2009
SIAM
162views Data Mining» more  SDM 2009»
10 years 6 months ago
Diversity-Based Weighting Schemes for Clustering Ensembles.
Clustering ensembles has been recently recognized as an emerging approach to provide more robust solutions to the data clustering problem. Current methods of clustering ensembles ...
Andrea Tagarelli, Francesco Gullo, Sergio Greco
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
10 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
10 years 6 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
SDM
2009
SIAM
119views Data Mining» more  SDM 2009»
10 years 6 months ago
Twin Vector Machines for Online Learning on a Budget.
This paper proposes Twin Vector Machine (TVM), a constant space and sublinear time Support Vector Machine (SVM) algorithm for online learning. TVM achieves its favorable scaling b...
Zhuang Wang, Slobodan Vucetic
SDM
2009
SIAM
205views Data Mining» more  SDM 2009»
10 years 6 months ago
Identifying Information-Rich Subspace Trends in High-Dimensional Data.
Identifying information-rich subsets in high-dimensional spaces and representing them as order revealing patterns (or trends) is an important and challenging research problem in m...
Chandan K. Reddy, Snehal Pokharkar
SDM
2009
SIAM
208views Data Mining» more  SDM 2009»
10 years 6 months ago
A Bayesian Approach Toward Finding Communities and Their Evolutions in Dynamic Social Networks.
Although a large body of work are devoted to finding communities in static social networks, only a few studies examined the dynamics of communities in evolving social networks. I...
Tianbao Yang, Yun Chi, Shenghuo Zhu, Yihong Gong, ...
SDM
2009
SIAM
140views Data Mining» more  SDM 2009»
10 years 6 months ago
Straightforward Feature Selection for Scalable Latent Semantic Indexing.
Latent Semantic Indexing (LSI) has been validated to be effective on many small scale text collections. However, little evidence has shown its effectiveness on unsampled large sca...
Jun Yan, Shuicheng Yan, Ning Liu, Zheng Chen
SDM
2009
SIAM
164views Data Mining» more  SDM 2009»
10 years 6 months ago
Exact Discovery of Time Series Motifs.
Time series motifs are pairs of individual time series, or subsequences of a longer time series, which are very similar to each other. As with their discrete analogues in computat...
Abdullah Mueen, Eamonn J. Keogh, M. Brandon Westov...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
10 years 6 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
books