Sciweavers

98 search results - page 14 / 20
» Chinese Novelty Mining
Sort
View
JISE
2007
116views more  JISE 2007»
13 years 7 months ago
Mining Navigation Behaviors for Term Suggestion of Search Engines
Query expansion is extensively applied in information retrieval systems, such as search engines. Most conventional approaches to query expansion have been developed based on textua...
Hahn-Ming Lee, Chi-Chun Huang, Wei-Tang Hung
ICDM
2008
IEEE
95views Data Mining» more  ICDM 2008»
14 years 2 months ago
Publishing Sensitive Transactions for Itemset Utility
We consider the problem of publishing sensitive transaction data with privacy preservation. High dimensionality of transaction data poses unique challenges on data privacy and dat...
Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Che...
SIGIR
2009
ACM
14 years 2 months ago
Identifying the original contribution of a document via language modeling
Abstract. One major goal of text mining is to provide automatic methods to help humans grasp the key ideas in ever-increasing text corpora. To this effect, we propose a statistica...
Benyah Shaparenko, Thorsten Joachims
PKDD
2005
Springer
96views Data Mining» more  PKDD 2005»
14 years 1 months ago
Testing Theories in Particle Physics Using Maximum Likelihood and Adaptive Bin Allocation
We describe a methodology to assist scientists in quantifying the degree of evidence in favor of a new proposed theory compared to a standard baseline theory. The figure of merit ...
Bruce Knuteson, Ricardo Vilalta
GPEM
2010
134views more  GPEM 2010»
13 years 6 months ago
An ensemble-based evolutionary framework for coping with distributed intrusion detection
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...