Sciweavers

2705 search results - page 443 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
UIC
2010
Springer
15 years 10 days ago
Smart Itinerary Recommendation Based on User-Generated GPS Trajectories
Traveling to unfamiliar regions require a significant effort from novice travelers to plan where to go within a limited duration. In this paper, we propose a smart recommendation...
Hyoseok Yoon, Yu Zheng, Xing Xie, Woontack Woo
SIGSOFT
2005
ACM
15 years 7 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
KDD
2005
ACM
177views Data Mining» more  KDD 2005»
15 years 7 months ago
Combining partitions by probabilistic label aggregation
Data clustering represents an important tool in exploratory data analysis. The lack of objective criteria render model selection as well as the identification of robust solutions...
Tilman Lange, Joachim M. Buhmann
NN
2008
Springer
152views Neural Networks» more  NN 2008»
15 years 1 months ago
Analysis of the IJCNN 2007 agnostic learning vs. prior knowledge challenge
We organized a challenge for IJCNN 2007 to assess the added value of prior domain knowledge in machine learning. Most commercial data mining programs accept data pre-formatted in ...
Isabelle Guyon, Amir Saffari, Gideon Dror, Gavin C...
CANDC
2009
ACM
15 years 8 months ago
A sub-symbolic model of the cognitive processes of re-representation and insight
We present a sub-symbolic computational model for effecting knowledge re-representation and insight. Given a set of data, manifold learning is used to automatically organize the d...
Dan Ventura