Sciweavers

1085 search results - page 84 / 217
» Active Mining in a Distributed Setting
Sort
View
KDD
2008
ACM
134views Data Mining» more  KDD 2008»
14 years 10 months ago
Privacy-preserving cox regression for survival analysis
Privacy-preserving data mining (PPDM) is an emergent research area that addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper we prop...
Shipeng Yu, Glenn Fung, Rómer Rosales, Srir...
PAKDD
2009
ACM
171views Data Mining» more  PAKDD 2009»
14 years 2 months ago
Detecting Abnormal Events via Hierarchical Dirichlet Processes
Abstract. Detecting abnormal event from video sequences is an important problem in computer vision and pattern recognition and a large number of algorithms have been devised to tac...
Xian-Xing Zhang, Hua Liu, Yang Gao, Derek Hao Hu
ICDM
2008
IEEE
115views Data Mining» more  ICDM 2008»
14 years 4 months ago
Toward Faster Nonnegative Matrix Factorization: A New Algorithm and Comparisons
Nonnegative Matrix Factorization (NMF) is a dimension reduction method that has been widely used for various tasks including text mining, pattern analysis, clustering, and cancer ...
Jingu Kim, Haesun Park
ICNP
2003
IEEE
14 years 3 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
SDM
2003
SIAM
120views Data Mining» more  SDM 2003»
13 years 11 months ago
Estimation of Topological Dimension
We present two extensions of the algorithm by Broomhead et al [2] which is based on the idea that singular values that scale linearly with the radius of the data ball can be explo...
Douglas R. Hundley, Michael J. Kirby