Sciweavers

199 search results - page 29 / 40
» Applications and Research Problems of Subgroup Mining
Sort
View
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
15 years 2 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
IAT
2003
IEEE
15 years 2 months ago
Person Name Identification in Chinese Documents Using Finite State Automata
This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in ma...
Bing Shen, Zhongfei (Mark) Zhang, Chunfa Yuan
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
15 years 4 months ago
Analyses and Fundamental ideas for a Relation Extraction Approach
Relation extraction is a difficult open research problem with important applications in several fields such as knowledge management, web mining, ontology building, intelligent sys...
Lobna Karoui, Marie-Aude Aufaure, Nacéra Be...
ICONIP
2008
14 years 11 months ago
Frost Prediction Characteristics and Classification Using Computational Neural Networks
The effect of frost on the successful growth and quality of crops is well understood by growers as leading potentially to total harvest failure. Studying the frost phenomenon, espe...
Philip Sallis, Mary Carmen Jarur Muñoz, Mar...
75
Voted
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 2 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu