Sciweavers

176 search results - page 25 / 36
» Crime Data Mining: A General Framework and Some Examples
Sort
View
ARGMAS
2009
Springer
14 years 2 months ago
Multi-Party Argument from Experience
Abstract. A framework, PISA, for conducting dialogues to resolve disputes concerning the correct categorisation of particular cases, is described. Unlike previous systems to conduc...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
14 years 7 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
14 years 4 months ago
Constraint-Based Subspace Clustering.
In high dimensional data, the general performance of traditional clustering algorithms decreases. This is partly because the similarity criterion used by these algorithms becomes ...
Élisa Fromont, Adriana Prado, Céline...
DMKD
2003
ACM
114views Data Mining» more  DMKD 2003»
14 years 20 days ago
Deriving link-context from HTML tag tree
HTML anchors are often surrounded by text that seems to describe the destination page appropriately. The text surrounding a link or the link-context is used for a variety of tasks...
Gautam Pant
KDD
2009
ACM
164views Data Mining» more  KDD 2009»
14 years 8 months ago
Social influence analysis in large-scale networks
In large social networks, nodes (users, entities) are influenced by others for various reasons. For example, the colleagues have strong influence on one's work, while the fri...
Jie Tang, Jimeng Sun, Chi Wang, Zi Yang