Sciweavers

2049 search results - page 254 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
MSR
2005
ACM
15 years 10 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
AI
2001
Springer
15 years 9 months ago
Learning Bayesian Belief Network Classifiers: Algorithms and System
Abstract. This paper investigates the methods for learning predictive classifiers based on Bayesian belief networks (BN) – primarily unrestricted Bayesian networks and Bayesian m...
Jie Cheng, Russell Greiner
WKDD
2010
CPS
204views Data Mining» more  WKDD 2010»
15 years 9 months ago
A Scalable, Accurate Hybrid Recommender System
—Recommender systems apply machine learning techniques for filtering unseen information and can predict whether a user would like a given resource. There are three main types of...
Mustansar Ali Ghazanfar, Adam Prügel-Bennett
WSCG
2003
161views more  WSCG 2003»
15 years 5 months ago
A Visualization-based Approach to Explore Geographic Metadata
The paper presents a visualization-based approach to explore large databases of geographic metadata. The aim of the data exploration is to search and acquire expressive geographic...
Riccardo Albertoni, Alessio Bertone, Monica De Mar...
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 11 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...