Sciweavers

1701 search results - page 195 / 341
» Providing k-anonymity in data mining
Sort
View
64
Voted
ICDM
2006
IEEE
138views Data Mining» more  ICDM 2006»
15 years 4 months ago
Adding Semantics to Email Clustering
This paper presents a novel algorithm to cluster emails according to their contents and the sentence styles of their subject lines. In our algorithm, natural language processing t...
Hua Li, Dou Shen, Benyu Zhang, Zheng Chen, Qiang Y...
63
Voted
ICDM
2010
IEEE
109views Data Mining» more  ICDM 2010»
14 years 8 months ago
Term Filtering with Bounded Error
Abstract--In this paper, we consider a novel problem referred to as term filtering with bounded error to reduce the term (feature) space by eliminating terms without (or with bound...
Zi Yang, Wei Li, Jie Tang, Juanzi Li
121
Voted
JDCTA
2010
163views more  JDCTA 2010»
14 years 5 months ago
Predictive Analysis for Customer Relationship Management
The approach for predictive analysis focuses on a business strategy to streamline business-customer relationships in order to maximize client satisfaction and thereby improve cust...
Manisha Rathi, Anand Priyadarshini, Ankit Rastogi
ICDE
2012
IEEE
246views Database» more  ICDE 2012»
13 years 19 days ago
HiCS: High Contrast Subspaces for Density-Based Outlier Ranking
—Outlier mining is a major task in data analysis. Outliers are objects that highly deviate from regular objects in their local neighborhood. Density-based outlier ranking methods...
Fabian Keller, Emmanuel Müller, Klemens B&oum...
BMCBI
2005
246views more  BMCBI 2005»
14 years 10 months ago
ParPEST: a pipeline for EST data analysis based on parallel computing
Background: Expressed Sequence Tags (ESTs) are short and error-prone DNA sequences generated from the 5' and 3' ends of randomly selected cDNA clones. They provide an im...
Nunzio D'Agostino, Mario Aversano, Maria Luisa Chi...