Sciweavers

2705 search results - page 149 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
14 years 10 months ago
The "DGX" distribution for mining massive, skewed data
Skewed distributions appear very often in practice. Unfortunately, the traditional Zipf distribution often fails to model them well. In this paper, we propose a new probability di...
Zhiqiang Bi, Christos Faloutsos, Flip Korn
FIMI
2003
136views Data Mining» more  FIMI 2003»
13 years 11 months ago
Intersecting data to closed sets with constraints
We describe a method for computing closed sets with data-dependent constraints. Especially, we show how the method can be adapted to find frequent closed sets in a given data set...
Taneli Mielikäinen
ICDM
2007
IEEE
109views Data Mining» more  ICDM 2007»
14 years 4 months ago
Language-Independent Set Expansion of Named Entities Using the Web
Set expansion refers to expanding a given partial set of objects into a more complete set. A well-known example system that does set expansion using the web is Google Sets. In thi...
Richard C. Wang, William W. Cohen
ICDM
2007
IEEE
187views Data Mining» more  ICDM 2007»
14 years 4 months ago
A Comparative Study of Methods for Transductive Transfer Learning
The problem of transfer learning, where information gained in one learning task is used to improve performance in another related task, is an important new area of research. While...
Andrew Arnold, Ramesh Nallapati, William W. Cohen
CORR
2006
Springer
118views Education» more  CORR 2006»
13 years 10 months ago
Integration and mining of malaria molecular, functional and pharmacological data: how far are we from a chemogenomic knowledge s
The organization and mining of malaria genomic and post-genomic data is important to significantly increase the knowledge of the biology of its causative agents, and is motivated,...
L.-M. Birkholtz, Olivier Bastien, G. Wells, D. Gra...