Sciweavers

220 search results - page 32 / 44
» Peer-to-Peer Usage Analysis: a Distributed Mining Approach
Sort
View
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
13 years 11 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
11 years 9 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
SDM
2010
SIAM
168views Data Mining» more  SDM 2010»
13 years 5 months ago
Convex Principal Feature Selection
A popular approach for dimensionality reduction and data analysis is principal component analysis (PCA). A limiting factor with PCA is that it does not inform us on which of the o...
Mahdokht Masaeli, Yan Yan, Ying Cui, Glenn Fung, J...
BMCBI
2010
70views more  BMCBI 2010»
13 years 7 months ago
The Text-mining based PubChem Bioassay neighboring analysis
Background: In recent years, the number of High Throughput Screening (HTS) assays deposited in PubChem has grown quickly. As a result, the volume of both the structured informatio...
Lianyi Han, Tugba O. Suzek, Yanli Wang, Steve H. B...
SAC
2010
ACM
14 years 2 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil