Sciweavers

2705 search results - page 486 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
87
Voted
KDD
1998
ACM
80views Data Mining» more  KDD 1998»
15 years 6 months ago
Human Performance on Clustering Web Pages: A Preliminary Study
With the increase in information on the World Wide Web it has become difficult to quickly find desired information without using multiple queries or using a topic-specific search ...
Sofus A. Macskassy, Arunava Banerjee, Brian D. Dav...
129
Voted
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
15 years 5 months ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 4 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...
130
Voted
FAC
2000
124views more  FAC 2000»
15 years 1 months ago
Algebraic Models of Correctness for Microprocessors
In this paper we present a method of describing microprocessors at different levels of temporal and data abstraction. We consider microprogrammed, pipelined and superscalar proces...
Anthony C. J. Fox, Neal A. Harman
JMLR
2012
13 years 4 months ago
Bayesian Comparison of Machine Learning Algorithms on Single and Multiple Datasets
We propose a new method for comparing learning algorithms on multiple tasks which is based on a novel non-parametric test that we call the Poisson binomial test. The key aspect of...
Alexandre Lacoste, François Laviolette, Mar...