Sciweavers

279 search results - page 41 / 56
» Methods for finding frequent items in data streams
Sort
View
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 1 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
CEAS
2008
Springer
13 years 9 months ago
Activity-centred Search in Email
We consider activity-centered tasks in email, including the novel task of predicting future involvement of persons from an enterprise in an ongoing activity represented by a folde...
Einat Minkov, Ramnath Balasubramanyan, William W. ...
ICML
2010
IEEE
13 years 8 months ago
Mixed Membership Matrix Factorization
Discrete mixed membership modeling and continuous latent factor modeling (also known as matrix factorization) are two popular, complementary approaches to dyadic data analysis. In...
Lester W. Mackey, David Weiss, Michael I. Jordan
AEI
2007
91views more  AEI 2007»
13 years 7 months ago
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a tr...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
MASS
2010
353views Communications» more  MASS 2010»
13 years 2 months ago
Trailing mobile sinks: A proactive data reporting protocol for Wireless Sensor Networks
In Wireless Sensor Networks (WSN), data gathering using mobile sinks typically incurs constant propagation of sink location indication messages to guide the direction of data repor...
Xinxin Liu, Han Zhao, Xin Yang, Xiaolin Li, Ning W...