Sciweavers

651 search results - page 83 / 131
» Negative Database for Data Security
Sort
View
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 8 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
CIKM
2009
Springer
14 years 2 months ago
Improving web page classification by label-propagation over click graphs
In this paper, we present a semi-supervised learning method for web page classification, leveraging click logs to augment training data by propagating class labels to unlabeled si...
Soo-Min Kim, Patrick Pantel, Lei Duan, Scott Gaffn...
AMFG
2005
IEEE
314views Biometrics» more  AMFG 2005»
14 years 1 months ago
Two-Dimensional Non-negative Matrix Factorization for Face Representation and Recognition
Non-negative matrix factorization (NMF) is a recently developed method for finding parts-based representation of non-negative data such as face images. Although it has successfully...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou
VLDB
2001
ACM
114views Database» more  VLDB 2001»
14 years 7 days ago
Distinct Sampling for Highly-Accurate Answers to Distinct Values Queries and Event Reports
Estimating the number of distinct values is a wellstudied problem, due to its frequent occurrence in queries and its importance in selecting good query plans. Previous work has sh...
Phillip B. Gibbons
MM
2005
ACM
172views Multimedia» more  MM 2005»
14 years 1 months ago
Learning the semantics of multimedia queries and concepts from a small number of examples
In this paper we unify two supposedly distinct tasks in multimedia retrieval. One task involves answering queries with a few examples. The other involves learning models for seman...
Apostol Natsev, Milind R. Naphade, Jelena Tesic