Sciweavers

645 search results - page 11 / 129
» A Data Mining Address Book
Sort
View
ADMA
2008
Springer
122views Data Mining» more  ADMA 2008»
14 years 2 months ago
Open Domain Recommendation: Social Networks and Collaborative Filtering
Commercial enterprises employ data mining techniques to recommend products to their customers. Most of the prior research is usually focused on a specific domain such as movies or...
Sarah K. Tyler, Yi Zhang
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
14 years 1 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
14 years 8 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
14 years 2 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
CAINE
2008
13 years 10 months ago
Hierarchical Clustering of Features on Categorical Data of Biomedical Applications
Data mining became increasingly important in bioinformatics and biomedical area during last decade. Various data mining methods, such as association rule mining and clustering, ha...
Yi Lu, Lily R. Liang