Sciweavers

1232 search results - page 122 / 247
» Evaluating role mining algorithms
Sort
View
KDD
2000
ACM
110views Data Mining» more  KDD 2000»
14 years 1 months ago
An empirical analysis of techniques for constructing and searching k-dimensional trees
Affordable, fast computers with large memories have lessened the demand for program efficiency, but applications such as browsing and searching very large databases often have rat...
Douglas A. Talbert, Douglas H. Fisher
PKDD
2000
Springer
100views Data Mining» more  PKDD 2000»
14 years 1 months ago
Learning Right Sized Belief Networks by Means of a Hybrid Methodology
Previous algoritms for the construction of belief networks structures from data are mainly based either on independence criteria or on scoring metrics. The aim of this paper is to ...
Silvia Acid, Luis M. de Campos
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
13 years 11 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 11 months ago
Robust Clustering in Arbitrarily Oriented Subspaces
In this paper, we propose an efficient and effective method to find arbitrarily oriented subspace clusters by mapping the data space to a parameter space defining the set of possi...
Elke Achtert, Christian Böhm, Jörn David...
EMNLP
2010
13 years 8 months ago
Improving Gender Classification of Blog Authors
The problem of automatically classifying the gender of a blog author has important applications in many commercial domains. Existing systems mainly use features such as words, wor...
Arjun Mukherjee, Bing Liu