Sciweavers

676 search results - page 78 / 136
» Data Mining with Distributed Agents in E-Commerce Applicatio...
Sort
View
KDD
2005
ACM
112views Data Mining» more  KDD 2005»
16 years 7 days ago
Model-based overlapping clustering
While the vast majority of clustering algorithms are partitional, many real world datasets have inherently overlapping clusters. Several approaches to finding overlapping clusters...
Arindam Banerjee, Chase Krumpelman, Joydeep Ghosh,...
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 5 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
MAGS
2007
100views more  MAGS 2007»
14 years 11 months ago
Engineering agent-mediated integration of bioinformatics analysis tools
Abstract. The availability of massive amounts of biological data, distributed in various data sources, has prompted the development of a wide range of data analysis tools. However,...
Vassilis Koutkias, Andigoni Malousi, Nicos Maglave...
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
14 years 9 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 7 days ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé