Sciweavers

6656 search results - page 1245 / 1332
» Change, Change, Change: Three Approaches
Sort
View
CHI
2009
ACM
14 years 9 months ago
Designing for discovery: opening the hood for open-source end user tinkering
According to the Free Software Movement, the user ought to have "the freedoms to make changes, and to publish improved versions" and "to study how the program works...
Gifford Cheung, Parmit Chilana, Shaun K. Kane, Bra...
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
14 years 9 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
KDD
2002
ACM
127views Data Mining» more  KDD 2002»
14 years 9 months ago
Mining knowledge-sharing sites for viral marketing
Viral marketing takes advantage of networks of influence among customers to inexpensively achieve large changes in behavior. Our research seeks to put it on a firmer footing by mi...
Matthew Richardson, Pedro Domingos
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 9 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
« Prev « First page 1245 / 1332 Last » Next »