Sciweavers

1976 search results - page 127 / 396
» Predictive Graph Mining
Sort
View
SDM
2008
SIAM
138views Data Mining» more  SDM 2008»
13 years 11 months ago
Clustering from Constraint Graphs
In constrained clustering it is common to model the pairwise constraints as edges on the graph of observations. Using results from graph theory, we analyze such constraint graphs ...
Ari Freund, Dan Pelleg, Yossi Richter
ICDM
2009
IEEE
171views Data Mining» more  ICDM 2009»
13 years 7 months ago
Hybrid Clustering by Integrating Text and Citation Based Graphs in Journal Database Analysis
We propose a hybrid clustering strategy by integrating heterogeneous information sources as graphs. The hybrid clustering method is extended on the basis of modularity based Louva...
Xinhai Liu, Shi Yu, Yves Moreau, Frizo A. L. Janss...
PAKDD
2010
ACM
134views Data Mining» more  PAKDD 2010»
14 years 1 days ago
Generating Diverse Ensembles to Counter the Problem of Class Imbalance
Abstract. One of the more challenging problems faced by the data mining community is that of imbalanced datasets. In imbalanced datasets one class (sometimes severely) outnumbers t...
T. Ryan Hoens, Nitesh V. Chawla
ICDM
2010
IEEE
185views Data Mining» more  ICDM 2010»
13 years 8 months ago
Detecting Non-compliant Consumers in Spatio-Temporal Health Data: A Case Study from Medicare Australia
This paper describes our experience with applying data mining techniques to the problem of fraud detection in spatio-temporal health data in Medicare Australia. A modular framework...
Kee Siong Ng, Yin Shan, D. Wayne Murray, Alison Su...
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
13 years 7 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa