Sciweavers

239 search results - page 40 / 48
» Mining User Reviews: from Specification to Summarization
Sort
View
CHI
2008
ACM
14 years 8 months ago
DRAGON: a direct manipulation interface for frame-accurate in-scene video navigation
We present DRAGON, a direct manipulation interaction technique for frame-accurate navigation in video scenes. This technique benefits tasks such as professional and amateur video ...
Thorsten Karrer, Malte Weiss, Eric Lee, Jan Borche...
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
14 years 18 hour ago
A framework for specifying explicit bias for revision of approximate information extraction rules
Information extraction is one of the most important techniques used in Text Mining. One of the main problems in building information extraction (IE) systems is that the knowledge ...
Ronen Feldman, Yair Liberzon, Binyamin Rosenfeld, ...

Tutorial
2179views
15 years 8 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 8 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
14 years 8 months ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo