Sciweavers

177 search results - page 30 / 36
» Using randomized response techniques for privacy-preserving ...
Sort
View
70
Voted
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
15 years 1 months ago
Large Datasets Lead to Overly Complex Models: An Explanation and a Solution
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
Tim Oates, David Jensen
ICDE
2007
IEEE
167views Database» more  ICDE 2007»
15 years 4 months ago
Load Shedding for Window Joins on Multiple Data Streams
We consider the problem of semantic load shedding for continuous queries containing window joins on multiple data streams and propose a robust approach that is effective with the ...
Yan-Nei Law, Carlo Zaniolo
GIS
2008
ACM
15 years 10 months ago
Finding regional co-location patterns for sets of continuous variables in spatial datasets
This paper proposes a novel framework for mining regional colocation patterns with respect to sets of continuous variables in spatial datasets. The goal is to identify regions in ...
Christoph F. Eick, Jean-Philippe Nicot, Rachana Pa...
ICIP
2007
IEEE
15 years 11 months ago
Analysis of the Decoding-Complexity of Compressed Image-Based Scene Representations
Interactive navigation in image-based scenes requires random access to the compressed reference image data. When using state of the art block-based hybrid video coding techniques,...
Ingo Bauermann, Eckehard G. Steinbach
71
Voted
KDD
2003
ACM
109views Data Mining» more  KDD 2003»
15 years 10 months ago
Experimental design for solicitation campaigns
Data mining techniques are routinely used by fundraisers to select those prospects from a large pool of candidates who are most likely to make a financial contribution. These tech...
Uwe F. Mayer, Armand Sarkissian