Sciweavers

722 search results - page 95 / 145
» Data Cleaning: Problems and Current Approaches
Sort
View
ICDM
2008
IEEE
146views Data Mining» more  ICDM 2008»
15 years 8 months ago
Isolation Forest
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify instances that do not conform to the normal profile as anomalies...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
WSDM
2010
ACM
211views Data Mining» more  WSDM 2010»
15 years 6 months ago
IntervalRank - Isotonic Regression with Listwise and Pairwise Constraints
Ranking a set of retrieved documents according to their relevance to a given query has become a popular problem at the intersection of web search, machine learning, and informatio...
Taesup Moon, Alex Smola, Yi Chang, Zhaohui Zheng
ICANN
2011
Springer
14 years 5 months ago
Semi-supervised Learning for WLAN Positioning
Currently the most accurate WLAN positioning systems are based on the fingerprinting approach, where a “radio map” is constructed by modeling how the signal strength measureme...
Teemu Pulkkinen, Teemu Roos, Petri Myllymäki
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 3 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
SIGMOD
2007
ACM
156views Database» more  SIGMOD 2007»
16 years 2 months ago
M-invariance: towards privacy preserving re-publication of dynamic datasets
The previous literature of privacy preserving data publication has focused on performing "one-time" releases. Specifically, none of the existing solutions supports re-pu...
Xiaokui Xiao, Yufei Tao