Sciweavers

775 search results - page 121 / 155
» Email data cleaning
Sort
View
136
Voted
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
15 years 1 months ago
Detecting Novel Discrepancies in Communication Networks
Abstract--We address the problem of detecting characteristic patterns in communication networks. We introduce a scalable approach based on set-system discrepancy. By implicitly lab...
James Abello, Tina Eliassi-Rad, Nishchal Devanur
174
Voted
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
13 years 11 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
138
Voted
WSDM
2012
ACM
214views Data Mining» more  WSDM 2012»
13 years 11 months ago
Selecting actions for resource-bounded information extraction using reinforcement learning
Given a database with missing or uncertain content, our goal is to correct and fill the database by extracting specific information from a large corpus such as the Web, and to d...
Pallika H. Kanani, Andrew K. McCallum
163
Voted
PAMI
2012
13 years 6 months ago
Domain Transfer Multiple Kernel Learning
—Cross-domain learning methods have shown promising results by leveraging labeled patterns from the auxiliary domain to learn a robust classifier for the target domain which has ...
Lixin Duan, Ivor W. Tsang, Dong Xu
142
Voted
MLDM
2005
Springer
15 years 9 months ago
Supervised Evaluation of Dataset Partitions: Advantages and Practice
In the context of large databases, data preparation takes a greater importance : instances and explanatory attributes have to be carefully selected. In supervised learning, instanc...
Sylvain Ferrandiz, Marc Boullé