Sciweavers

518 search results - page 79 / 104
» Data Mining Techniques on the Evaluation of Wireless Churn
Sort
View
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
15 years 11 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
119
Voted
EPIA
2003
Springer
15 years 7 months ago
Automatic Selection of Table Areas in Documents for Information Extraction
: information contained in companies’ financial statements is valuable for decision making at various levels. Much of the relevant information in such documents is contained in t...
Ana Costa e Silva, Alípio Jorge, Luí...
KRDB
1996
123views Database» more  KRDB 1996»
15 years 3 months ago
Flexible Query-Answering Systems Modelled in Metalogic Programming
Metaprogramming adds new expressive power to logic programming which can be advantageous to transfer to the field of deductive databases. We propose metaprogramming as a way to mo...
Troels Andreasen, Henning Christiansen
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
16 years 2 months ago
Efficient methods for topic model inference on streaming document collections
Topic models provide a powerful tool for analyzing large text collections by representing high dimensional data in a low dimensional subspace. Fitting a topic model given a set of...
Limin Yao, David M. Mimno, Andrew McCallum
NOSSDAV
2001
Springer
15 years 6 months ago
Network support for mobile multimedia using a self-adaptive distributed proxy
Recent advancements in video and audio codec technologies (e.g., RealVideo [18]) make multimedia streaming possible across a wide range of network conditions. With an increasing t...
Zhuoqing Morley Mao, Hoi-sheung Wilson So, Byungho...