Sciweavers

373 search results - page 21 / 75
» Identifying graphs from noisy and incomplete data
Sort
View
CHI
2011
ACM
12 years 11 months ago
Guess who?: enriching the social graph through a crowdsourcing game
Despite the tremendous popularity of social network sites both on the web and within enterprises, the relationship information they contain may be often incomplete or outdated. We...
Ido Guy, Adam Perer, Tal Daniel, Ohad Greenshpan, ...
SDM
2012
SIAM
252views Data Mining» more  SDM 2012»
11 years 10 months ago
Learning from Heterogeneous Sources via Gradient Boosting Consensus
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...
Xiaoxiao Shi, Jean-François Paiement, David...
ICDM
2010
IEEE
101views Data Mining» more  ICDM 2010»
13 years 5 months ago
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system that re...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chi...
PERVASIVE
2006
Springer
13 years 7 months ago
Building Reliable Activity Models Using Hierarchical Shrinkage and Mined Ontology
Abstract. Activity inference based on object use has received considerable recent attention. Such inference requires statistical models that map activities to the objects used in p...
Emmanuel Munguia Tapia, Tanzeem Choudhury, Matthai...
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 4 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos