Sciweavers

1232 search results - page 134 / 247
» Evaluating role mining algorithms
Sort
View
FPL
2008
Springer
207views Hardware» more  FPL 2008»
13 years 12 months ago
Bitstream compression techniques for Virtex 4 FPGAs
This paper examines the opportunity of using compression for accelerating the (re)configuration of FPGA devices, focusing on the choice of compression algorithms, and their hardwa...
Radu Stefan, Sorin Dan Cotofana
SDM
2008
SIAM
140views Data Mining» more  SDM 2008»
13 years 11 months ago
Creating a Cluster Hierarchy under Constraints of a Partially Known Hierarchy
Although clustering under constraints is a current research topic, a hierarchical setting, in which a hierarchy of clusters is the goal, is usually not considered. This paper trie...
Korinna Bade, Andreas Nürnberger
KDD
2009
ACM
174views Data Mining» more  KDD 2009»
14 years 11 months ago
Audience selection for on-line brand advertising: privacy-friendly social network targeting
This paper describes and evaluates privacy-friendly methods for extracting quasi-social networks from browser behavior on user-generated content sites, for the purpose of finding ...
Foster J. Provost, Brian Dalessandro, Rod Hook, Xi...
KR
2004
Springer
14 years 3 months ago
Condensed Representations for Inductive Logic Programming
When mining frequent Datalog queries, many queries will be equivalent in the light of an implicit or explicit background knowledge. To alleviate the problem, we introduce various t...
Luc De Raedt, Jan Ramon
JSAI
2001
Springer
14 years 2 months ago
Basket Analysis on Meningitis Data
Basket Analysis is the most representative approach in recent study of data mining. However, it cannot be directly applied to the data including numeric data. In this paper, we cl...
Takayuki Ikeda, Takashi Washio, Hiroshi Motoda