Sciweavers

20294 search results - page 3924 / 4059
» Algorithmic Information Theory
Sort
View
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
16 years 5 months ago
Adapting the right measures for K-means clustering
Clustering validation is a long standing challenge in the clustering literature. While many validation measures have been developed for evaluating the performance of clustering al...
Junjie Wu, Hui Xiong, Jian Chen
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
16 years 5 months ago
Efficient methods for topic model inference on streaming document collections
Topic models provide a powerful tool for analyzing large text collections by representing high dimensional data in a low dimensional subspace. Fitting a topic model given a set of...
Limin Yao, David M. Mimno, Andrew McCallum
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 5 months ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
16 years 5 months ago
Relational learning via latent social dimensions
Social media such as blogs, Facebook, Flickr, etc., presents data in a network format rather than classical IID distribution. To address the interdependency among data instances, ...
Lei Tang, Huan Liu
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
16 years 5 months ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
« Prev « First page 3924 / 4059 Last » Next »