Sciweavers

3651 search results - page 161 / 731
» Data Mining for Security Applications
Sort
View
KDD
2010
ACM
257views Data Mining» more  KDD 2010»
15 years 9 months ago
Multi-task learning for boosting with application to web search ranking
In this paper we propose a novel algorithm for multi-task learning with boosted decision trees. We learn several different learning tasks with a joint model, explicitly addressing...
Olivier Chapelle, Pannagadatta K. Shivaswamy, Srin...
IJDMMM
2008
72views more  IJDMMM 2008»
15 years 5 months ago
Mining event histories: a social science perspective
We explore how recent data-mining-based tools developed in domains such as biomedicine or text-mining for extracting interesting knowledge from sequence data could be applied to pe...
Gilbert Ritschard, Alexis Gabadinho, Nicolas S. M&...
WOA
2010
15 years 3 months ago
Classification of Whereabouts Patterns From Large-scale Mobility Data
Classification of users' whereabouts patterns is important for many emerging ubiquitous computing applications. Latent Dirichlet Allocation (LDA) is a powerful mechanism to e...
Laura Ferrari, Marco Mamei
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
15 years 11 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 11 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf