Sciweavers

8243 search results - page 1586 / 1649
» Can We Manage Trust
Sort
View
KDD
2007
ACM
167views Data Mining» more  KDD 2007»
14 years 9 months ago
Generalized component analysis for text with heterogeneous attributes
We present a class of richly structured, undirected hidden variable models suitable for simultaneously modeling text along with other attributes encoded in different modalities. O...
Xuerui Wang, Chris Pal, Andrew McCallum
KDD
2006
ACM
191views Data Mining» more  KDD 2006»
14 years 9 months ago
Beyond classification and ranking: constrained optimization of the ROI
Classification has been commonly used in many data mining projects in the financial service industry. For instance, to predict collectability of accounts receivable, a binary clas...
Lian Yan, Patrick Baldasare
KDD
2006
ACM
253views Data Mining» more  KDD 2006»
14 years 9 months ago
Adaptive Website Design Using Caching Algorithms
Visitors enter a website through a variety of means, including web searches, links from other sites, and personal bookmarks. In some cases the first page loaded satisfies the visi...
Justin Brickell, Inderjit S. Dhillon, Dharmendra S...
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
14 years 9 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 9 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
« Prev « First page 1586 / 1649 Last » Next »