Sciweavers

7163 search results - page 1267 / 1433
» Privacy-Preserving Data Mining
Sort
View
KDD
2007
ACM
169views Data Mining» more  KDD 2007»
15 years 11 months ago
Exploiting underrepresented query aspects for automatic query expansion
Users attempt to express their search goals through web search queries. When a search goal has multiple components or aspects, documents that represent all the aspects are likely ...
Daniel Crabtree, Peter Andreae, Xiaoying Gao
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
15 years 11 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal
KDD
2005
ACM
140views Data Mining» more  KDD 2005»
15 years 11 months ago
Graphs over time: densification laws, shrinking diameters and possible explanations
How do real graphs evolve over time? What are "normal" growth patterns in social, technological, and information networks? Many studies have discovered patterns in stati...
Jure Leskovec, Jon M. Kleinberg, Christos Faloutso...
KDD
2005
ACM
192views Data Mining» more  KDD 2005»
15 years 11 months ago
Modeling and predicting personal information dissemination behavior
In this paper, we propose a new way to automatically model and predict human behavior of receiving and disseminating information by analyzing the contact and content of personal c...
Xiaodan Song, Ching-Yung Lin, Belle L. Tseng, Ming...
KDD
2004
ACM
141views Data Mining» more  KDD 2004»
15 years 11 months ago
A Maximum Entropy Approach to Biomedical Named Entity Recognition
Machine learning approaches are frequently used to solve name entity (NE) recognition (NER). In this paper we propose a hybrid method that uses maximum entropy (ME) as the underly...
Yi-Feng Lin, Tzong-Han Tsai, Wen-Chi Chou, Kuen-Pi...
« Prev « First page 1267 / 1433 Last » Next »