Sciweavers

6388 search results - page 61 / 1278
» High Performance Data Mining
Sort
View
WSDM
2010
ACM
266views Data Mining» more  WSDM 2010»
16 years 26 days ago
Gathering and Ranking Photos of Named Entities with High Precision, High Recall, and Diversity
Knowledge-sharing communities like Wikipedia and automated extraction methods like those of DBpedia enable the construction of large machine-processible knowledge bases with relat...
Bilyana Taneva, Mouna Kacimi, Gerhard Weikum
KDD
2006
ACM
118views Data Mining» more  KDD 2006»
16 years 3 months ago
Maximum profit mining and its application in software development
While most software defects (i.e., bugs) are corrected and tested as part of the lengthy software development cycle, enterprise software vendors often have to release software pro...
Charles X. Ling, Victor S. Sheng, Tilmann F. W. Br...
108
Voted
IADIS
2004
15 years 4 months ago
Discovering data dependencies in Web content mining
Web content mining opens up the possibility to use data presented in web pages for the discovery of interesting and useful patterns. Our web mining tool, FBL (Filtered Bayesian Le...
José Carlos Cortizo, J. Ignacio Girá...
131
Voted
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
15 years 1 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
167
Voted
EDBT
2004
ACM
234views Database» more  EDBT 2004»
16 years 3 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu