Sciweavers

269 search results - page 45 / 54
» Novel Algorithms for Privacy Preserving Utility Mining
Sort
View
KDD
2012
ACM
166views Data Mining» more  KDD 2012»
11 years 9 months ago
Selecting a characteristic set of reviews
Online reviews provide consumers with valuable information that guides their decisions on a variety of fronts: from entertainment and shopping to medical services. Although the pr...
Theodoros Lappas, Mark Crovella, Evimaria Terzi
CIKM
2004
Springer
14 years 3 days ago
Optimizing web search using web click-through data
The performance of web search engines may often deteriorate due to the diversity and noisy information contained within web pages. User click-through data can be used to introduce...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Yong Yu, W...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 5 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
ICSE
2010
IEEE-ACM
13 years 11 months ago
Using dynamic execution traces and program invariants to enhance behavioral model inference
Software behavioral models have proven useful for design, validation, verification, and maintenance. However, existing approaches for deriving such models sometimes overgeneraliz...
Ivo Krka, Yuriy Brun, Daniel Popescu, Joshua Garci...
ICDE
2008
IEEE
203views Database» more  ICDE 2008»
14 years 8 months ago
Training Linear Discriminant Analysis in Linear Time
Linear Discriminant Analysis (LDA) has been a popular method for extracting features which preserve class separability. It has been widely used in many fields of information proces...
Deng Cai, Xiaofei He, Jiawei Han