Sciweavers

2049 search results - page 264 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
KDD
2008
ACM
193views Data Mining» more  KDD 2008»
15 years 11 months ago
A family of dissimilarity measures between nodes generalizing both the shortest-path and the commute-time distances
This work introduces a new family of link-based dissimilarity measures between nodes of a weighted directed graph. This measure, called the randomized shortest-path (RSP) dissimil...
Luh Yen, Marco Saerens, Amin Mantrach, Masashi Shi...
IEEEIA
2009
14 years 9 months ago
How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent
In this paper we propose the CTS (Concious Tutoring System) technology, a biologically plausible cognitive agent based on human brain functions.This agent is capable of learning a...
Usef Faghihi, Philippe Fournier-Viger, Roger Nkamb...
KDD
2007
ACM
189views Data Mining» more  KDD 2007»
15 years 11 months ago
Corroborate and learn facts from the web
The web contains lots of interesting factual information about entities, such as celebrities, movies or products. This paper describes a robust bootstrapping approach to corrobora...
Shubin Zhao, Jonathan Betz
SISAP
2010
IEEE
243views Data Mining» more  SISAP 2010»
14 years 9 months ago
Similarity matrix compression for efficient signature quadratic form distance computation
Determining similarities among multimedia objects is a fundamental task in many content-based retrieval, analysis, mining, and exploration applications. Among state-of-the-art sim...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 6 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li