Sciweavers

2049 search results - page 302 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 4 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
KDD
1994
ACM
96views Data Mining» more  KDD 1994»
15 years 3 months ago
DICE: A Discovery Environment Integrating Inductive Bias
: Most of Knowledge Discovery in Database (KDD) systems are integrating efficient Machine Learning techniques. In fact issues in Machine Learning and KDD are very close allowing fo...
Jean-Daniel Zucker, Vincent Corruble, J. Thomas, G...
GFKL
2006
Springer
89views Data Mining» more  GFKL 2006»
15 years 2 months ago
The Relationship of Word Length and Sentence Length: The Inter-Textual Perspective
The present study concentrates on the relation between sentence length (SL) and word length (WL) as a possible factor in text classification. The dependence of WL and SL is discuss...
Peter Grzybek, Ernst Stadlober, Emmerich Kelih
KDD
2000
ACM
114views Data Mining» more  KDD 2000»
15 years 2 months ago
Learning Prosodic Patterns for Mandarin Speech Synthesis
Higher quality synthesized speech is required for widespread use of text-to-speech (TTS) technology, and prosodic pattern is the key feature that makes synthetic speech sound unna...
Yiqiang Chen, Wen Gao, Tingshao Zhu
CIKM
2008
Springer
15 years 1 months ago
Web-scale named entity recognition
Automatic recognition of named entities such as people, places, organizations, books, and movies across the entire web presents a number of challenges, both of scale and scope. Da...
Casey Whitelaw, Alexander Kehlenbeck, Nemanja Petr...