Sciweavers

312 search results - page 35 / 63
» A General Divide and Conquer Approach for Process Mining
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
15 years 11 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
BMCBI
2010
144views more  BMCBI 2010»
14 years 11 months ago
Identifying overrepresented concepts in gene lists from literature: a statistical approach based on Poisson mixture model
Background: Large-scale genomic studies often identify large gene lists, for example, the genes sharing the same expression patterns. The interpretation of these gene lists is gen...
Xin He, Moushumi Sen Sarma, Xu Ling, Brant W. Chee...
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 9 months ago
Argumentation Based Constraint Acquisition
Efficient acquisition of constraint networks is a key factor for the applicability of constraint problem solving methods. Current techniques ease knowledge acquisition by generati...
Kostyantyn M. Shchekotykhin, Gerhard Friedrich
68
Voted
ICDM
2006
IEEE
138views Data Mining» more  ICDM 2006»
15 years 5 months ago
Adding Semantics to Email Clustering
This paper presents a novel algorithm to cluster emails according to their contents and the sentence styles of their subject lines. In our algorithm, natural language processing t...
Hua Li, Dou Shen, Benyu Zhang, Zheng Chen, Qiang Y...
SIGIR
2003
ACM
15 years 4 months ago
Implicit link analysis for small web search
Current Web search engines generally impose link analysis-based re-ranking on web-page retrieval. However, the same techniques, when applied directly to small web search such as i...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...