Sciweavers

518 search results - page 55 / 104
» Data Mining Techniques on the Evaluation of Wireless Churn
Sort
View
ICDM
2003
IEEE
153views Data Mining» more  ICDM 2003»
15 years 7 months ago
Dimensionality Reduction Using Kernel Pooled Local Discriminant Information
We study the use of kernel subspace methods for learning low-dimensional representations for classification. We propose a kernel pooled local discriminant subspace method and com...
Peng Zhang, Jing Peng, Carlotta Domeniconi
PAKDD
2010
ACM
222views Data Mining» more  PAKDD 2010»
15 years 6 months ago
Online Sampling of High Centrality Individuals in Social Networks
In this work, we investigate the use of online or “crawling” algorithms to sample large social networks in order to determine the most influential or important individuals wit...
Arun S. Maiya, Tanya Y. Berger-Wolf
83
Voted
ICDM
2003
IEEE
143views Data Mining» more  ICDM 2003»
15 years 7 months ago
Active Sampling for Feature Selection
In knowledge discovery applications, where new features are to be added, an acquisition policy can help select the features to be acquired based on their relevance and the cost of...
Sriharsha Veeramachaneni, Paolo Avesani
ADBIS
2007
Springer
132views Database» more  ADBIS 2007»
15 years 8 months ago
Clustering Approach to Generalized Pattern Identification Based on Multi-instanced Objects with DARA
Clustering is an essential data mining task with various types of applications. Traditional clustering algorithms are based on a vector space model representation. A relational dat...
Rayner Alfred, Dimitar Kazakov
ADHOC
2008
132views more  ADHOC 2008»
15 years 2 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao