Sciweavers

2049 search results - page 172 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
15 years 11 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
KDD
2009
ACM
219views Data Mining» more  KDD 2009»
15 years 12 months ago
Structured correspondence topic models for mining captioned figures in biological literature
A major source of information (often the most crucial and informative part) in scholarly articles from scientific journals, proceedings and books are the figures that directly pro...
Amr Ahmed, Eric P. Xing, William W. Cohen, Robert ...
KDD
2006
ACM
118views Data Mining» more  KDD 2006»
15 years 11 months ago
Maximum profit mining and its application in software development
While most software defects (i.e., bugs) are corrected and tested as part of the lengthy software development cycle, enterprise software vendors often have to release software pro...
Charles X. Ling, Victor S. Sheng, Tilmann F. W. Br...
IDA
2005
Springer
15 years 4 months ago
Pulse: Mining Customer Opinions from Free Text
Abstract. We present a prototype system, code-named Pulse, for mining topics and sentiment orientation jointly from free text customer feedback. We describe the application of the ...
Michael Gamon, Anthony Aue, Simon Corston-Oliver, ...
ICWSM
2009
14 years 9 months ago
From Generating to Mining: Automatically Scripting Conversations Using Existing Online Sources
Hearing people argue opposing sides of an issue can be a useful way to understand the topic; however, these debates or conversations often don't exist. Unfortunately, generat...
Nathan D. Nichols, Lisa M. Gandy, Kristian J. Hamm...