Sciweavers

7228 search results - page 1070 / 1446
» From Algorithmic to Subjective Randomness
Sort
View
KDD
2006
ACM
183views Data Mining» more  KDD 2006»
16 years 4 months ago
Discovering interesting patterns through user's interactive feedback
In this paper, we study the problem of discovering interesting patterns through user's interactive feedback. We assume a set of candidate patterns (i.e., frequent patterns) h...
Dong Xin, Xuehua Shen, Qiaozhu Mei, Jiawei Han
KDD
2004
ACM
106views Data Mining» more  KDD 2004»
16 years 4 months ago
Early detection of insider trading in option markets
"Inside information" comes in many forms: knowledge of a corporate takeover, a terrorist attack, unexpectedly poor earnings, the FDA's acceptance of a new drug, etc...
Steve Donoho
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 4 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
KDD
2004
ACM
117views Data Mining» more  KDD 2004»
16 years 4 months ago
Regularized multi--task learning
Past empirical work has shown that learning multiple related tasks from data simultaneously can be advantageous in terms of predictive performance relative to learning these tasks...
Theodoros Evgeniou, Massimiliano Pontil
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 4 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
« Prev « First page 1070 / 1446 Last » Next »