Sciweavers

3651 search results - page 70 / 731
» Data Mining for Security Applications
Sort
View
91
Voted
SAC
2005
ACM
15 years 6 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
188
Voted
INCDM
2010
Springer
486views Data Mining» more  INCDM 2010»
15 years 2 months ago
Finding Temporal Patterns in Noisy Longitudinal Data: A Study in Diabetic Retinopathy
This paper describes an approach to temporal pattern mining using the concept of user de ned temporal prototypes to de ne the nature of the trends of interests. The temporal patt...
Vassiliki Somaraki, Deborah Broadbent, Frans Coene...
105
Voted
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
15 years 5 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
ICDM
2008
IEEE
136views Data Mining» more  ICDM 2008»
15 years 7 months ago
Generalized Framework for Syntax-Based Relation Mining
Supervised approaches to Data Mining are particularly appealing as they allow for the extraction of complex relations from data objects. In order to facilitate their application i...
Bonaventura Coppola, Alessandro Moschitti, Daniele...
IUI
2004
ACM
15 years 6 months ago
Visual data mining and zoomable interfaces
In this paper an approach for combining a focus+context visual data mining method with zoomable interfaces is shown. Therefore a zoomable interface for analysing structurable imag...
Alexander Kort