Sciweavers

1552 search results - page 176 / 311
» Mining for Patterns in Contradictory Data
Sort
View
134
Voted
CIDM
2009
IEEE
15 years 11 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
145
Voted
SOCIALCOM
2010
15 years 2 months ago
Mining Human Location-Routines Using a Multi-Level Approach to Topic Modeling
In this work we address the problem of modeling varying time duration sequences for large-scale human routine discovery from cellphone sensor data using a multi-level approach to p...
Katayoun Farrahi, Daniel Gatica-Perez
KDD
2012
ACM
281views Data Mining» more  KDD 2012»
13 years 7 months ago
Active spectral clustering via iterative uncertainty reduction
Spectral clustering is a widely used method for organizing data that only relies on pairwise similarity measurements. This makes its application to non-vectorial data straightforw...
Fabian L. Wauthier, Nebojsa Jojic, Michael I. Jord...
136
Voted
ICDM
2008
IEEE
96views Data Mining» more  ICDM 2008»
15 years 11 months ago
Filling in the Blanks - Krimp Minimisation for Missing Data
Many data sets are incomplete. For correct analysis of such data, one can either use algorithms that are designed to handle missing data or use imputation. Imputation has the bene...
Jilles Vreeken, Arno Siebes
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
15 years 10 months ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...