Sciweavers

2049 search results - page 212 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
KDD
2005
ACM
169views Data Mining» more  KDD 2005»
16 years 3 days ago
Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems ...
Bamshad Mobasher, Robin D. Burke, Chad Williams, R...
APN
2005
Springer
15 years 5 months ago
The ProM Framework: A New Era in Process Mining Tool Support
Under the umbrella of buzzwords such as “Business Activity Monitoring” (BAM) and “Business Process Intelligence” (BPI) both academic (e.g., EMiT, Little Thumb, InWoLvE, Pro...
Boudewijn F. van Dongen, Ana Karla A. de Medeiros,...
KDD
2008
ACM
155views Data Mining» more  KDD 2008»
16 years 3 days ago
Factorization meets the neighborhood: a multifaceted collaborative filtering model
Recommender systems provide users with personalized suggestions for products or services. These systems often rely on Collaborating Filtering (CF), where past transactions are ana...
Yehuda Koren
OSDI
2000
ACM
15 years 1 months ago
Towards Higher Disk Head Utilization: Extracting "Free" Bandwidth from Busy Disk Drives
Freeblock scheduling is a new approach to utilizing more of disks' potential media bandwidths. By filling rotational latency periods with useful media transfers, 20{50% of a ...
Christopher R. Lumb, Jiri Schindler, Gregory R. Ga...
CIKM
2010
Springer
14 years 10 months ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...