Sciweavers

2049 search results - page 334 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 5 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
KDD
2009
ACM
140views Data Mining» more  KDD 2009»
15 years 11 months ago
Improving clustering stability with combinatorial MRFs
: ? Improving Clustering Stability with Combinatorial MRFs Bekkerman, Ron; Scholz, Martin; Viswanathan, Krishnamurthy HP Laboratories HPL-2009-46 Clustering stability, combinatoria...
Ron Bekkerman, Martin Scholz, Krishnamurthy Viswan...
92
Voted
CSB
2003
IEEE
130views Bioinformatics» more  CSB 2003»
15 years 4 months ago
A Computational Approach to Reconstructing Gene Regulatory Networks
Reverse-engineering of gene networks using linear models often results in an underdetermined system because of excessive unknown parameters. In addition, the practical utility of ...
Xutao Deng, Hesham H. Ali
KDD
1997
ACM
169views Data Mining» more  KDD 1997»
15 years 3 months ago
Learning to Extract Text-Based Information from the World Wide Web
Thereis a wealthof informationto be minedfromnarrative text on the WorldWideWeb.Unfortunately, standard natural language processing (NLP)extraction techniques expect full, grammat...
Stephen Soderland
107
Voted
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
13 years 1 months ago
The untold story of the clones: content-agnostic factors that impact YouTube video popularity
Video dissemination through sites such as YouTube can have widespread impacts on opinions, thoughts, and cultures. Not all videos will reach the same popularity and have the same ...
Youmna Borghol, Sebastien Ardon, Niklas Carlsson, ...