Sciweavers

2705 search results - page 434 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
101
Voted
SIGKDD
2000
95views more  SIGKDD 2000»
15 years 2 months ago
Scalability for Clustering Algorithms Revisited
This paper presents a simple new algorithm that performs k-means clustering in one scan of a dataset, while using a bu er for points from the dataset of xed size. Experiments show...
Fredrik Farnstrom, James Lewis, Charles Elkan
150
Voted
WSDM
2012
ACM
267views Data Mining» more  WSDM 2012»
13 years 10 months ago
Learning to rank with multi-aspect relevance for vertical search
Many vertical search tasks such as local search focus on specific domains. The meaning of relevance in these verticals is domain-specific and usually consists of multiple well-d...
Changsung Kang, Xuanhui Wang, Yi Chang, Belle L. T...
140
Voted
FMCO
2003
Springer
114views Formal Methods» more  FMCO 2003»
15 years 7 months ago
Synchronous Closing and Flow Analysis for Model Checking Timed Systems
Abstract. Formal methods, in particular model checking, are increasingly accepted as integral part of system development. With large software systems beyond the range of fully auto...
Natalia Ioustinova, Natalia Sidorova, Martin Steff...
INFOCOM
2010
IEEE
15 years 1 months ago
Bayesian Inference for Localization in Cellular Networks
—In this paper, we present a general technique based on Bayesian inference to locate mobiles in cellular networks. We study the problem of localizing users in a cellular network ...
Hui Zang, François Baccelli, Jean Bolot
146
Voted
CIKM
2001
Springer
15 years 7 months ago
Selecting Relevant Instances for Efficient and Accurate Collaborative Filtering
Collaborative filtering uses a database about consumers’ preferences to make personal product recommendations and is achieving widespread success in both E-Commerce and Informat...
Kai Yu, Xiaowei Xu, Martin Ester, Hans-Peter Krieg...