Sciweavers

4085 search results - page 420 / 817
» Benchmarking Data Mining Algorithms
Sort
View
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
16 years 5 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
133
Voted
PKDD
2009
Springer
175views Data Mining» more  PKDD 2009»
15 years 11 months ago
Latent Dirichlet Bayesian Co-Clustering
Co-clustering has emerged as an important technique for mining contingency data matrices. However, almost all existing coclustering algorithms are hard partitioning, assigning each...
Pu Wang, Carlotta Domeniconi, Kathryn B. Laskey
ICDM
2007
IEEE
136views Data Mining» more  ICDM 2007»
15 years 11 months ago
Dynamic Micro Targeting: Fitness-Based Approach to Predicting Individual Preferences
It is crucial to segment customers intelligently in order to offer more targeted and personalized products and services. Traditionally, customer segmentation is achieved using sta...
Tianyi Jiang, Alexander Tuzhilin
KDD
2010
ACM
275views Data Mining» more  KDD 2010»
15 years 8 months ago
Combined regression and ranking
Many real-world data mining tasks require the achievement of two distinct goals when applied to unseen data: first, to induce an accurate preference ranking, and second to give g...
D. Sculley
WOSP
2010
ACM
15 years 12 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...