Sciweavers

582 search results - page 67 / 117
» On the definition of role mining
Sort
View
KDD
2004
ACM
190views Data Mining» more  KDD 2004»
16 years 7 days ago
Kernel k-means: spectral clustering and normalized cuts
Kernel k-means and spectral clustering have both been used to identify clusters that are non-linearly separable in input space. Despite significant research, these methods have re...
Inderjit S. Dhillon, Yuqiang Guan, Brian Kulis
MOBIHOC
2007
ACM
15 years 11 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
WKDD
2010
CPS
217views Data Mining» more  WKDD 2010»
15 years 6 months ago
Two-round Multi-Party Contract Signing
—A multi-party contract signing (MPCS) protocol allows a set of parties to exchange messages with each other to reach a state in which either each of them has a pre-agreed contra...
Xiangdong Li, Qiusheng Zheng
ICDM
2006
IEEE
111views Data Mining» more  ICDM 2006»
15 years 5 months ago
Social Capital in Friendship-Event Networks
In this paper, we examine a particular form of social network which we call a friendship-event network. A friendship-event network captures both the friendship relationship among ...
Louis Licamele, Lise Getoor
CASDMKM
2004
Springer
144views Data Mining» more  CASDMKM 2004»
15 years 5 months ago
Knowledge-Information Circulation Through the Enterprise: Forward to the Roots of Knowledge Management
The field of Knowledge Management (KM) has already completed its initiatory phase, characterized by operational confusion between knowledge and information, stemming from the tenuo...
Milan Zeleny