Sciweavers

2049 search results - page 192 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
16 years 1 days ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...
PAMI
2008
216views more  PAMI 2008»
14 years 11 months ago
Annotating Images by Mining Image Search Results
Although it has been studied for years by the computer vision and machine learning communities, image annotation is still far from practical. In this paper, we propose a novel atte...
Xin-Jing Wang, Lei Zhang 0001, Xirong Li, Wei-Ying...
SACMAT
2009
ACM
15 years 6 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
107
Voted
IS
2007
14 years 11 months ago
Business process mining: An industrial application
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover p...
Wil M. P. van der Aalst, Hajo A. Reijers, A. J. M....
102
Voted
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
15 years 5 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...