Sciweavers

7150 search results - page 1172 / 1430
» Graph-Based Data Mining
Sort
View
WWW
2011
ACM
13 years 4 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
JIIS
2010
106views more  JIIS 2010»
13 years 4 months ago
A new classification of datasets for frequent itemsets
The discovery of frequent patterns is a famous problem in data mining. While plenty of algorithms have been proposed during the last decade, only a few contributions have tried to ...
Frédéric Flouvat, Fabien De Marchi, ...
ICASSP
2011
IEEE
13 years 29 days ago
Exploiting query click logs for utterance domain detection in spoken language understanding
In this paper, we describe methods to exploit search queries mined from search engine query logs to improve domain detection in spoken language understanding. We propose extending...
Dilek Hakkani-Tür, Larry Heck, Gökhan T&...
SIGMOD
2007
ACM
195views Database» more  SIGMOD 2007»
14 years 9 months ago
Effective variation management for pseudo periodical streams
Many database applications require the analysis and processing of data streams. In such systems, huge amounts of data arrive rapidly and their values change over time. The variati...
Lv-an Tang, Bin Cui, Hongyan Li, Gaoshan Miao, Don...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 10 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
« Prev « First page 1172 / 1430 Last » Next »