Sciweavers

7163 search results - page 1240 / 1433
» Privacy-Preserving Data Mining
Sort
View
KDD
1997
ACM
169views Data Mining» more  KDD 1997»
15 years 3 months ago
Learning to Extract Text-Based Information from the World Wide Web
Thereis a wealthof informationto be minedfromnarrative text on the WorldWideWeb.Unfortunately, standard natural language processing (NLP)extraction techniques expect full, grammat...
Stephen Soderland
FLAIRS
2010
15 years 1 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
FLAIRS
2007
15 years 1 months ago
Low-Effort Labeling of Network Events for Intrusion Detection in WLANs
A low-effort data mining approach to labeling network event records in a WLAN is proposed. The problem being addressed is often observed in an AI and data mining strategy to netwo...
Taghi M. Khoshgoftaar, Chris Seiffert, Naeem Seliy...
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
15 years 29 days ago
Active learning for biomedical citation screening
Active learning (AL) is an increasingly popular strategy for mitigating the amount of labeled data required to train classifiers, thereby reducing annotator effort. We describe ...
Byron C. Wallace, Kevin Small, Carla E. Brodley, T...
KDD
2010
ACM
270views Data Mining» more  KDD 2010»
15 years 27 days ago
An energy-efficient mobile recommender system
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for knowledge discovery in transportation systems. A particular...
Yong Ge, Hui Xiong, Alexander Tuzhilin, Keli Xiao,...
« Prev « First page 1240 / 1433 Last » Next »