Sciweavers

2049 search results - page 373 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
108
Voted
ICDM
2009
IEEE
233views Data Mining» more  ICDM 2009»
15 years 5 months ago
Semi-Supervised Sequence Labeling with Self-Learned Features
—Typical information extraction (IE) systems can be seen as tasks assigning labels to words in a natural language sequence. The performance is restricted by the availability of l...
Yanjun Qi, Pavel Kuksa, Ronan Collobert, Kunihiko ...
81
Voted
ICDM
2008
IEEE
137views Data Mining» more  ICDM 2008»
15 years 5 months ago
Iterative Set Expansion of Named Entities Using the Web
Set expansion refers to expanding a partial set of “seed” objects into a more complete set. One system that does set expansion is SEAL (Set Expander for Any Language), which e...
Richard C. Wang, William W. Cohen
ICDM
2006
IEEE
124views Data Mining» more  ICDM 2006»
15 years 5 months ago
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering
Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. Howev...
Olivier Verscheure, Michail Vlachos, Aris Anagnost...
86
Voted
SIGSOFT
2005
ACM
15 years 4 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
80
Voted
VLDB
2004
ACM
163views Database» more  VLDB 2004»
15 years 4 months ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...