Sciweavers

7163 search results - page 1232 / 1433
» Privacy-Preserving Data Mining
Sort
View
SIGIR
2011
ACM
14 years 1 months ago
Decayed DivRank: capturing relevance, diversity and prestige in information networks
Many network-based ranking approaches have been proposed to rank objects according to different criteria, including relevance, prestige and diversity. However, existing approache...
Pan Du, Jiafeng Guo, Xueqi Cheng
CIKM
2011
Springer
13 years 11 months ago
Detecting anomalies in graphs with numeric labels
This paper presents Yagada, an algorithm to search labelled graphs for anomalies using both structural data and numeric attributes. Yagada is explained using several security-rela...
Michael Davis, Weiru Liu, Paul Miller, George Redp...
EDBT
2012
ACM
291views Database» more  EDBT 2012»
13 years 1 months ago
Relevance search in heterogeneous networks
Conventional research on similarity search focuses on measuring the similarity between objects with the same type. However, in many real-world applications, we need to measure the...
Chuan Shi, Xiangnan Kong, Philip S. Yu, Sihong Xie...
WWW
2008
ACM
15 years 11 months ago
Yes, there is a correlation: - from social networks to personal behavior on the web
Characterizing the relationship that exists between a person's social group and his/her personal behavior has been a long standing goal of social network analysts. In this pa...
Parag Singla, Matthew Richardson
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
15 years 11 months ago
Turning down the noise in the blogosphere
In recent years, the blogosphere has experienced a substantial increase in the number of posts published daily, forcing users to cope with information overload. The task of guidin...
Khalid El-Arini, Gaurav Veda, Dafna Shahaf, Carlos...
« Prev « First page 1232 / 1433 Last » Next »