Sciweavers

7163 search results - page 1338 / 1433
» Privacy-Preserving Data Mining
Sort
View
SDM
2009
SIAM
112views Data Mining» more  SDM 2009»
15 years 7 months ago
A Re-evaluation of the Over-Searching Phenomenon in Inductive Rule Learning.
Most commonly used inductive rule learning algorithms employ a hill-climbing search, whereas local pattern discovery algorithms employ exhaustive search. In this paper, we evaluat...
Frederik Janssen, Johannes Fürnkranz
SDM
2009
SIAM
126views Data Mining» more  SDM 2009»
15 years 7 months ago
An Entity Based Model for Coreference Resolution.
Recently, many advanced machine learning approaches have been proposed for coreference resolution; however, all of the discriminatively-trained models reason over mentions rather ...
Michael L. Wick, Aron Culotta, Khashayar Rohaniman...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 7 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
SDM
2009
SIAM
140views Data Mining» more  SDM 2009»
15 years 7 months ago
Straightforward Feature Selection for Scalable Latent Semantic Indexing.
Latent Semantic Indexing (LSI) has been validated to be effective on many small scale text collections. However, little evidence has shown its effectiveness on unsampled large sca...
Jun Yan, Shuicheng Yan, Ning Liu, Zheng Chen
SDM
2009
SIAM
220views Data Mining» more  SDM 2009»
15 years 7 months ago
Bayesian Cluster Ensembles.
Cluster ensembles provide a framework for combining multiple base clusterings of a dataset to generate a stable and robust consensus clustering. There are important variants of th...
Hongjun Wang, Hanhuai Shan, Arindam Banerjee
« Prev « First page 1338 / 1433 Last » Next »