Sciweavers

3651 search results - page 596 / 731
» Data Mining for Security Applications
Sort
View
WSDM
2010
ACM
227views Data Mining» more  WSDM 2010»
15 years 8 months ago
Folks in folksonomies: Social link prediction from shared metadata
Web 2.0 applications have attracted a considerable amount of attention because their open-ended nature allows users to create lightweight semantic scaffolding to organize and shar...
Rossano Schifanella, Alain Barrat, Ciro Cattuto, B...
SISAP
2009
IEEE
149views Data Mining» more  SISAP 2009»
15 years 5 months ago
Combinatorial Framework for Similarity Search
—We present an overview of the combinatorial framework for similarity search. An algorithm is combinatorial if only direct comparisons between two pairwise similarity values are ...
Yury Lifshits
ICDM
2009
IEEE
164views Data Mining» more  ICDM 2009»
15 years 5 months ago
iTopicModel: Information Network-Integrated Topic Modeling
—Document networks, i.e., networks associated with text information, are becoming increasingly popular due to the ubiquity of Web documents, blogs, and various kinds of online da...
Yizhou Sun, Jiawei Han, Jing Gao, Yintao Yu
ICDM
2007
IEEE
147views Data Mining» more  ICDM 2007»
15 years 5 months ago
Scalable Collaborative Filtering with Jointly Derived Neighborhood Interpolation Weights
Recommender systems based on collaborative filtering predict user preferences for products or services by learning past user-item relationships. A predominant approach to collabo...
Robert M. Bell, Yehuda Koren
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
15 years 4 months ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu