Sciweavers

2705 search results - page 427 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
237
Voted
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
16 years 4 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
NLPRS
2001
Springer
15 years 7 months ago
Automatic Corpus-Based Extraction of Chinese Legal Terms
This paper reports on a study involving the automatic extraction of Chinese legal terms. We used a word segmented corpus of Chinese court judgments to extract salient legal expres...
Oi Yee Kwong, Benjamin K. Tsou
106
Voted
SDM
2009
SIAM
108views Data Mining» more  SDM 2009»
15 years 11 months ago
Highlighting Diverse Concepts in Documents.
We show the underpinnings of a method for summarizing documents: it ingests a document and automatically highlights a small set of sentences that are expected to cover the differ...
Evimaria Terzi, Kun Liu, Tyrone Grandison
136
Voted
APSEC
2001
IEEE
15 years 6 months ago
Expert Maintainers' Strategies and Needs when Understanding Software: A Case Study Approach
Accelerating the learning curve of software maintainers working on systems with which they have little familiarity motivated this study. A working hypothesis was that automated me...
Christos Tjortjis, Paul J. Layzell
IRI
2008
IEEE
15 years 9 months ago
Compound record clustering algorithm for design pattern detection by decision tree learning
Recovering design patterns applied in a system can help refactoring the system. Machine learning algorithms have been successfully applied in mining data patterns. However, one of...
Jing Dong, Yongtao Sun, Yajing Zhao