Sciweavers

1768 search results - page 245 / 354
» Mining Very Large Databases
Sort
View
129
Voted
EDBT
2010
ACM
135views Database» more  EDBT 2010»
15 years 10 months ago
Region-based online promotion analysis
This paper addresses a fundamental and challenging problem with broad applications: efficient processing of region-based promotion queries, i.e., to discover the top-k most inter...
Tianyi Wu, Yizhou Sun, Cuiping Li, Jiawei Han
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
15 years 8 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
112
Voted
PVLDB
2008
99views more  PVLDB 2008»
15 years 3 months ago
Industry-scale duplicate detection
Duplicate detection is the process of identifying multiple representations of a same real-world object in a data source. Duplicate detection is a problem of critical importance in...
Melanie Weis, Felix Naumann, Ulrich Jehle, Jens Lu...
152
Voted
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 4 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
137
Voted
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 4 months ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester