Sciweavers

2049 search results - page 302 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 10 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
KDD
1994
ACM
96views Data Mining» more  KDD 1994»
15 years 8 months ago
DICE: A Discovery Environment Integrating Inductive Bias
: Most of Knowledge Discovery in Database (KDD) systems are integrating efficient Machine Learning techniques. In fact issues in Machine Learning and KDD are very close allowing fo...
Jean-Daniel Zucker, Vincent Corruble, J. Thomas, G...
GFKL
2006
Springer
89views Data Mining» more  GFKL 2006»
15 years 8 months ago
The Relationship of Word Length and Sentence Length: The Inter-Textual Perspective
The present study concentrates on the relation between sentence length (SL) and word length (WL) as a possible factor in text classification. The dependence of WL and SL is discuss...
Peter Grzybek, Ernst Stadlober, Emmerich Kelih
KDD
2000
ACM
114views Data Mining» more  KDD 2000»
15 years 8 months ago
Learning Prosodic Patterns for Mandarin Speech Synthesis
Higher quality synthesized speech is required for widespread use of text-to-speech (TTS) technology, and prosodic pattern is the key feature that makes synthetic speech sound unna...
Yiqiang Chen, Wen Gao, Tingshao Zhu
CIKM
2008
Springer
15 years 6 months ago
Web-scale named entity recognition
Automatic recognition of named entities such as people, places, organizations, books, and movies across the entire web presents a number of challenges, both of scale and scope. Da...
Casey Whitelaw, Alexander Kehlenbeck, Nemanja Petr...