Sciweavers

7163 search results - page 1294 / 1433
» Privacy-Preserving Data Mining
Sort
View
74
Voted
SDM
2009
SIAM
152views Data Mining» more  SDM 2009»
15 years 7 months ago
Non-negative Matrix Factorization, Convexity and Isometry.
In this paper we explore avenues for improving the reliability of dimensionality reduction methods such as Non-Negative Matrix Factorization (NMF) as interpretive exploratory data...
Nikolaos Vasiloglou, Alexander G. Gray, David V. A...
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
15 years 7 months ago
CORE: Nonparametric Clustering of Large Numeric Databases.
Current clustering techniques are able to identify arbitrarily shaped clusters in the presence of noise, but depend on carefully chosen model parameters. The choice of model param...
Andrej Taliun, Arturas Mazeika, Michael H. Bö...
86
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 7 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
89
Voted
SDM
2009
SIAM
162views Data Mining» more  SDM 2009»
15 years 7 months ago
Diversity-Based Weighting Schemes for Clustering Ensembles.
Clustering ensembles has been recently recognized as an emerging approach to provide more robust solutions to the data clustering problem. Current methods of clustering ensembles ...
Andrea Tagarelli, Francesco Gullo, Sergio Greco
SDM
2009
SIAM
185views Data Mining» more  SDM 2009»
15 years 7 months ago
Understanding Importance of Collaborations in Co-authorship Networks: A Supportiveness Analysis Approach.
Co-authorship networks, an important type of social networks, have been studied extensively from various angles such as degree distribution analysis, social community extraction a...
Bin Zhou 0002, Jian Pei, Yan Jia, Yi Han
« Prev « First page 1294 / 1433 Last » Next »