Sciweavers

7163 search results - page 1287 / 1433
» Privacy-Preserving Data Mining
Sort
View
WSDM
2012
ACM
243views Data Mining» more  WSDM 2012»
13 years 5 months ago
No search result left behind: branching behavior with browser tabs
Today’s Web browsers allow users to open links in new windows or tabs. This action, which we call ‘branching’, is sometimes performed on search results when the user plans t...
Jeff Huang, Thomas Lin, Ryen W. White
WSDM
2012
ACM
325views Data Mining» more  WSDM 2012»
13 years 5 months ago
Coupled temporal scoping of relational facts
Recent research has made significant advances in automatically constructing knowledge bases by extracting relational facts (e.g., Bill Clinton-presidentOf-US) from large text cor...
Partha Pratim Talukdar, Derry Tanti Wijaya, Tom Mi...
KDD
2012
ACM
229views Data Mining» more  KDD 2012»
13 years 23 days ago
Finding trendsetters in information networks
Influential people have an important role in the process of information diffusion. However, there are several ways to be influential, for example, to be the most popular or the...
Diego Sáez-Trumper, Giovanni Comarela, Virg...
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 23 days ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
13 years 23 days ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...
« Prev « First page 1287 / 1433 Last » Next »