Sciweavers

2049 search results - page 263 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
GFKL
2007
Springer
196views Data Mining» more  GFKL 2007»
15 years 5 months ago
Collaborative Tag Recommendations
Abstract. With the increasing popularity of collaborative tagging systems, services that assist the user in the task of tagging, such as tag recommenders, are more and more require...
Leandro Balby Marinho, Lars Schmidt-Thieme
MOBIHOC
2007
ACM
15 years 11 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
15 years 5 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
CORR
2011
Springer
185views Education» more  CORR 2011»
14 years 6 months ago
Sound and Complete Query Answering in Intensional P2P Data Integration
Contemporary use of the term ’intension’ derives from the traditional logical doctrine that an idea has both an extension and an intension. In this paper we introduce an intens...
Zoran Majkic
IDA
2006
Springer
14 years 11 months ago
Classification of symbolic objects: A lazy learning approach
Symbolic data analysis aims at generalizing some standard statistical data mining methods, such as those developed for classification tasks, to the case of symbolic objects (SOs). ...
Annalisa Appice, Claudia d'Amato, Floriana Esposit...