Sciweavers

1701 search results - page 184 / 341
» Providing k-anonymity in data mining
Sort
View
ICDM
2010
IEEE
122views Data Mining» more  ICDM 2010»
14 years 8 months ago
Interesting Subset Discovery and Its Application on Service Processes
Various real-life datasets can be viewed as a set of records consisting of attributes explaining the records and set of measures evaluating the records. In this paper, we address t...
Maitreya Natu, Girish Keshav Palshikar
WSCG
2003
161views more  WSCG 2003»
14 years 11 months ago
A Visualization-based Approach to Explore Geographic Metadata
The paper presents a visualization-based approach to explore large databases of geographic metadata. The aim of the data exploration is to search and acquire expressive geographic...
Riccardo Albertoni, Alessio Bertone, Monica De Mar...
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
15 years 11 months ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
15 years 10 months ago
Unsupervised learning on k-partite graphs
Various data mining applications involve data objects of multiple types that are related to each other, which can be naturally formulated as a k-partite graph. However, the resear...
Bo Long, Xiaoyun Wu, Zhongfei (Mark) Zhang, Philip...
WSDM
2012
ACM
262views Data Mining» more  WSDM 2012»
13 years 6 months ago
Effects of user similarity in social media
There are many settings in which users of a social media application provide evaluations of one another. In a variety of domains, mechanisms for evaluation allow one user to say w...
Ashton Anderson, Daniel P. Huttenlocher, Jon M. Kl...