Sciweavers

1125 search results - page 157 / 225
» A flocking based algorithm for document clustering analysis
Sort
View
120
Voted
RECSYS
2009
ACM
15 years 7 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
DKE
2002
218views more  DKE 2002»
15 years 2 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
117
Voted
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
15 years 6 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
135
Voted
CVPR
2009
IEEE
16 years 9 months ago
Stochastic Gradient Kernel Density Mode-Seeking
As a well known fixed-point iteration algorithm for kernel density mode-seeking, Mean-Shift has attracted wide attention in pattern recognition field. To date, Mean-Shift algorit...
Xiaotong Yuan, Stan Z. Li
111
Voted
JCP
2006
111views more  JCP 2006»
15 years 2 months ago
Mining Developing Trends of Dynamic Spatiotemporal Data Streams
This paper1 presents an efficient modeling technique for data streams in a dynamic spatiotemporal environment and its suitability for mining developing trends. The streaming data a...
Yu Meng, Margaret H. Dunham