Sciweavers

708 search results - page 60 / 142
» Improving Mining Quality by Exploiting Data Dependency
Sort
View
ISCC
2008
IEEE
148views Communications» more  ISCC 2008»
15 years 6 months ago
Data collection in sensor networks with data mules: An integrated simulation analysis
Wireless sensor networks (WSNs) have emerged as the enabling technology for a wide range of applications. In the context of environmental monitoring, especially in urban scenarios...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco
ICDM
2007
IEEE
96views Data Mining» more  ICDM 2007»
15 years 6 months ago
The Chosen Few: On Identifying Valuable Patterns
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a human expert or a machine learning technique could m...
Björn Bringmann, Albrecht Zimmermann
ACSC
2006
IEEE
15 years 6 months ago
Improvements of TLAESA nearest neighbour search algorithm and extension to approximation search
Nearest neighbour (NN) searches and k nearest neighbour (k-NN) searches are widely used in pattern recognition and image retrieval. An NN (k-NN) search finds the closest object (...
Ken Tokoro, Kazuaki Yamaguchi, Sumio Masuda
ICDM
2006
IEEE
296views Data Mining» more  ICDM 2006»
15 years 5 months ago
Fast Random Walk with Restart and Its Applications
How closely related are two nodes in a graph? How to compute this score quickly, on huge, disk-resident, real graphs? Random walk with restart (RWR) provides a good relevance scor...
Hanghang Tong, Christos Faloutsos, Jia-Yu Pan
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
15 years 6 months ago
Set-Based Boosting for Instance-Level Transfer
—The success of transfer to improve learning on a target task is highly dependent on the selected source data. Instance-based transfer methods reuse data from the source tasks to...
Eric Eaton, Marie desJardins