Sciweavers

25167 search results - page 4898 / 5034
» Parallel and Distributed Algorithms
Sort
View
124
Voted
KDD
2007
ACM
169views Data Mining» more  KDD 2007»
16 years 3 months ago
Exploiting underrepresented query aspects for automatic query expansion
Users attempt to express their search goals through web search queries. When a search goal has multiple components or aspects, documents that represent all the aspects are likely ...
Daniel Crabtree, Peter Andreae, Xiaoying Gao
116
Voted
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 3 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002
143
Voted
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 3 months ago
Computer aided detection via asymmetric cascade of sparse hyperplane classifiers
This paper describes a novel classification method for computer aided detection (CAD) that identifies structures of interest from medical images. CAD problems are challenging larg...
Jinbo Bi, Senthil Periaswamy, Kazunori Okada, Tosh...
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
16 years 3 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
153
Voted
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 3 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
« Prev « First page 4898 / 5034 Last » Next »