Sciweavers

1701 search results - page 199 / 341
» Providing k-anonymity in data mining
Sort
View
CIKM
2008
Springer
15 years 5 days ago
SHOPSMART: product recommendations through technical specifications and user reviews
This paper describes a new method for providing recommendations tailored to a user's preferences using text mining techniques and online technical specifications of products....
Alexander Yates, James Joseph, Ana-Maria Popescu, ...
97
Voted
IJAIT
2007
180views more  IJAIT 2007»
14 years 10 months ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas
132
Voted
TKDE
2012
270views Formal Methods» more  TKDE 2012»
13 years 17 days ago
Low-Rank Kernel Matrix Factorization for Large-Scale Evolutionary Clustering
—Traditional clustering techniques are inapplicable to problems where the relationships between data points evolve over time. Not only is it important for the clustering algorith...
Lijun Wang, Manjeet Rege, Ming Dong, Yongsheng Din...
DMKD
1997
ACM
198views Data Mining» more  DMKD 1997»
15 years 2 months ago
Clustering Based On Association Rule Hypergraphs
Clustering in data mining is a discovery process that groups a set of data such that the intracluster similarity is maximized and the intercluster similarity is minimized. These d...
Eui-Hong Han, George Karypis, Vipin Kumar, Bamshad...
KDD
2000
ACM
101views Data Mining» more  KDD 2000»
15 years 1 months ago
Incremental quantile estimation for massive tracking
Data--call records, internet packet headers, or other transaction records--are coming down a pipe at a ferocious rate, and we need to monitor statistics of the data. There is no r...
Fei Chen, Diane Lambert, José C. Pinheiro