Sciweavers

1232 search results - page 199 / 247
» Evaluating role mining algorithms
Sort
View
VLDB
1998
ACM
105views Database» more  VLDB 1998»
13 years 12 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
TKDE
2008
115views more  TKDE 2008»
13 years 7 months ago
Time-Aware Web Users' Clustering
Web users clustering is a crucial task for mining information related to users needs and preferences. Up to now, popular clustering approaches build clusters based on usage pattern...
Sophia G. Petridou, Vassiliki A. Koutsonikola, Ath...
GIS
2010
ACM
13 years 6 months ago
Finding similar users using category-based location history
In this paper, we aim to estimate the similarity between users according to their GPS trajectories. Our approach first models a user’s GPS trajectories with a semantic location ...
Xiangye Xiao, Yu Zheng, Qiong Luo, Xing Xie
JAISE
2010
182views Algorithms» more  JAISE 2010»
13 years 2 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
BMCBI
2007
139views more  BMCBI 2007»
13 years 7 months ago
Bioinformatics analysis of the early inflammatory response in a rat thermal injury model
Background: Thermal injury is among the most severe forms of trauma and its effects are both local and systemic. Response to thermal injury includes cellular protection mechanisms...
Eric Yang, Timothy Maguire, Martin L. Yarmush, Fra...