Sciweavers

775 search results - page 37 / 155
» Email data cleaning
Sort
View
ADMA
2009
Springer
246views Data Mining» more  ADMA 2009»
14 years 4 months ago
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach
Image spam is a new trend in the family of email spams. The new image spams employ a variety of image processing technologies to create random noises. In this paper, we propose a s...
Yan Gao, Ming Yang, Alok N. Choudhary
KDD
2002
ACM
183views Data Mining» more  KDD 2002»
14 years 10 months ago
E-CAST: A Data Mining Algorithm for Gene Expression Data
Data clustering methods have been proven to be a successful data mining technique in the analysis of gene expression data. The Cluster affinity search technique (CAST) developed b...
Abdelghani Bellaachia, David Portnoy, Yidong Chen,...
INTERACT
2003
13 years 11 months ago
User Interface Transformation Method for PC Remote Control with Small Mobile Devices
: One problem with controlling remote PCs via small mobile devices such as cellular phones is the difference between PC GUIs and mobile device UIs (screen sizes, input devices etc....
Hidehiko Okada, Toshiyuki Asahi
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 4 months ago
Mixed-Membership Stochastic Block-Models for Transactional Networks
Abstract: Transactional network data can be thought of as a list of oneto-many communications (e.g., email) between nodes in a social network. Most social network models convert th...
Mahdi Shafiei, Hugh Chipman
ICDE
2005
IEEE
108views Database» more  ICDE 2005»
14 years 3 months ago
Robust Identification of Fuzzy Duplicates
Detecting and eliminating fuzzy duplicates is a critical data cleaning task that is required by many applications. Fuzzy duplicates are multiple seemingly distinct tuples which re...
Surajit Chaudhuri, Venkatesh Ganti, Rajeev Motwani