Sciweavers

2308 search results - page 394 / 462
» A Perspective on Databases and Data Mining
Sort
View
DAWAK
2006
Springer
15 years 8 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
KDD
2000
ACM
114views Data Mining» more  KDD 2000»
15 years 8 months ago
Learning Prosodic Patterns for Mandarin Speech Synthesis
Higher quality synthesized speech is required for widespread use of text-to-speech (TTS) technology, and prosodic pattern is the key feature that makes synthetic speech sound unna...
Yiqiang Chen, Wen Gao, Tingshao Zhu
CIKM
2010
Springer
15 years 3 months ago
Understanding retweeting behaviors in social networks
Retweeting is an important action (behavior) on Twitter, indicating the behavior that users re-post microblogs of their friends. While much work has been conducted for mining text...
Zi Yang, Jingyi Guo, Keke Cai, Jie Tang, Juanzi Li...
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 7 months ago
Web image prediction using multivariate point processes
In this paper, we investigate a problem of predicting what images are likely to appear on the Web at a future time point, given a query word and a database of historical image str...
Gunhee Kim, Fei-Fei Li, Eric P. Xing
CIKM
2009
Springer
15 years 11 months ago
Exploring relevance for clicks
Mining feedback information from user click-through data is an important issue for modern Web retrieval systems in terms of architecture analysis, performance evaluation and algor...
Rongwei Cen, Yiqun Liu, Min Zhang, Bo Zhou, Liyun ...