Sciweavers

1232 search results - page 144 / 247
» Evaluating role mining algorithms
Sort
View
KDD
2012
ACM
186views Data Mining» more  KDD 2012»
12 years 25 days ago
Maximum inner-product search using cone trees
The problem of efficiently finding the best match for a query in a given set with respect to the Euclidean distance or the cosine similarity has been extensively studied. However...
Parikshit Ram, Alexander G. Gray
SIGIR
2004
ACM
14 years 3 months ago
Web-a-where: geotagging web content
We describe Web-a-Where, a system for associating geography with Web pages. Web-a-Where locates mentions of places and determines the place each name refers to. In addition, it as...
Einat Amitay, Nadav Har'El, Ron Sivan, Aya Soffer
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
14 years 11 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
14 years 11 months ago
COA: finding novel patents through text analysis
In recent years, the number of patents filed by the business enterprises in the technology industry are growing rapidly, thus providing unprecedented opportunities for knowledge d...
Mohammad Al Hasan, W. Scott Spangler, Thomas D. Gr...
PAISI
2009
Springer
14 years 5 months ago
Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences
Discovering a representative set of theme patterns from a large amount of text for interpreting their meaning has always been concerned by researches of both data mining and inform...
Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang, ...