Sciweavers

1701 search results - page 196 / 341
» Providing k-anonymity in data mining
Sort
View
89
Voted
KDD
2006
ACM
253views Data Mining» more  KDD 2006»
15 years 10 months ago
Adaptive Website Design Using Caching Algorithms
Visitors enter a website through a variety of means, including web searches, links from other sites, and personal bookmarks. In some cases the first page loaded satisfies the visi...
Justin Brickell, Inderjit S. Dhillon, Dharmendra S...
83
Voted
IDEAL
2009
Springer
15 years 4 months ago
Improving the Language Active Learning with Multiagent Systems
Nowadays, there is a growing need for providing novel solutions to facilitate active learning in dependency environments. This paper present a multiagent architecture that incorpor...
Cristian Pinzón, Vivian López, Javie...
EDM
2010
125views Data Mining» more  EDM 2010»
14 years 11 months ago
Towards EDM Framework for Personalization of Information Services in RPM Systems
Remote Patient Management Systems (RPM) besides monitoring the health conditions of patients provide them with different information services that currently are predefined and foll...
Ekaterina Vasilyeva, Mykola Pechenizkiy, Aleksandr...
DGO
2003
295views Education» more  DGO 2003»
14 years 11 months ago
Technology Implementation Management in Law Enforcement: COPLINK System Usability and User Acceptance Evaluations
In this paper, we report on two user-centric evaluation studies of COPLINK, a suite of criminal data mining and knowledge management applications developed at the University of Ari...
Chienting Lin, Paul J. Hu, Hsinchun Chen, Jennifer...
77
Voted
NAACL
2004
14 years 11 months ago
The (Non)Utility of Predicate-Argument Frequencies for Pronoun Interpretation
State-of-the-art pronoun interpretation systems rely predominantly on morphosyntactic contextual features. While the use of deep knowledge and inference to improve these models wo...
Andrew Kehler, Douglas E. Appelt, Lara Taylor, Ale...