Sciweavers

1512 search results - page 247 / 303
» Towards the Personalization of Algorithms Evaluation in Data...
Sort
View
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
15 years 10 months ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester
MICCAI
2009
Springer
15 years 11 months ago
Constructing a Dictionary of Human Brain Folding Patterns
Abstract. Brain imaging provides a wealth of information that computers can explore at a massive scale. Categorizing the patterns of the human cortex has been a challenging issue f...
Zhong Yi Sun, Matthieu Perrot, Alan Tucholka, Deni...
SDM
2009
SIAM
112views Data Mining» more  SDM 2009»
15 years 7 months ago
A Re-evaluation of the Over-Searching Phenomenon in Inductive Rule Learning.
Most commonly used inductive rule learning algorithms employ a hill-climbing search, whereas local pattern discovery algorithms employ exhaustive search. In this paper, we evaluat...
Frederik Janssen, Johannes Fürnkranz
IUI
2012
ACM
13 years 5 months ago
Summarizing sporting events using twitter
The status updates posted to social networks, such as Twitter and Facebook, contain a myriad of information about what people are doing and watching. During events, such as sports...
Jeffrey Nichols, Jalal Mahmud, Clemens Drews
CIKM
2010
Springer
14 years 8 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...