Sciweavers

3651 search results - page 155 / 731
» Data Mining for Security Applications
Sort
View
WMCSA
2008
IEEE
15 years 11 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
16 years 5 months ago
Algorithms for discovering bucket orders from data
Ordering and ranking items of different types are important tasks in various applications, such as query processing and scientific data mining. A total order for the items can be ...
Aristides Gionis, Heikki Mannila, Kai Puolamä...
KDD
2006
ACM
149views Data Mining» more  KDD 2006»
16 years 5 months ago
Regularized discriminant analysis for high dimensional, low sample size data
Linear and Quadratic Discriminant Analysis have been used widely in many areas of data mining, machine learning, and bioinformatics. Friedman proposed a compromise between Linear ...
Jieping Ye, Tie Wang
WWW
2008
ACM
15 years 5 months ago
Discovering geographical-specific interests from web click data
As the Internet continues to play an important role in many business applications, it becomes vital to increase the competitive edge by offering geographically tailored contents t...
Chang Sheng, Wynne Hsu, Mong-Li Lee
SDM
2010
SIAM
156views Data Mining» more  SDM 2010»
15 years 6 months ago
Unsupervised Discovery of Abnormal Activity Occurrences in Multi-dimensional Time Series, with Applications in Wearable Systems
We present a method for unsupervised discovery of abnormal occurrences of activities in multi-dimensional time series data. Unsupervised activity discovery approaches differ from ...
Alireza Vahdatpour, Majid Sarrafzadeh