Sciweavers

186 search results - page 18 / 38
» Genetic process mining: an experimental evaluation
Sort
View
KDD
2008
ACM
148views Data Mining» more  KDD 2008»
14 years 8 months ago
Get another label? improving data quality and data mining using multiple, noisy labelers
This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated la...
Victor S. Sheng, Foster J. Provost, Panagiotis G. ...
SIGIR
2011
ACM
12 years 10 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
13 years 5 months ago
Clustering Trajectories of Moving Objects in an Uncertain World
Mining Trajectory Databases (TD) has recently gained great interest due to the popularity of tracking devices. On the other hand, the inherent presence of uncertainty in TD (e.g.,...
Nikos Pelekis, Ioannis Kopanakis, Evangelos E. Kot...
KDD
2004
ACM
151views Data Mining» more  KDD 2004»
14 years 8 months ago
Feature selection in scientific applications
Numerous applications of data mining to scientific data involve the induction of a classification model. In many cases, the collection of data is not performed with this task in m...
Erick Cantú-Paz, Shawn Newsam, Chandrika Ka...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 8 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof