Sciweavers

2705 search results - page 155 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
PAKDD
2005
ACM
164views Data Mining» more  PAKDD 2005»
14 years 3 months ago
Covariance and PCA for Categorical Variables
Covariances from categorical variables are defined using a regular simplex expression for categories. The method follows the variance definition by Gini, and it gives the covaria...
Hirotaka Niitsuma, Takashi Okada
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 5 months ago
An exploration of climate data using complex networks
To discover patterns in historical data, climate scientists have applied various clustering methods with the goal of identifying regions that share some common climatological beha...
Karsten Steinhaeuser, Nitesh V. Chawla, Auroop R. ...
WSDM
2012
ACM
252views Data Mining» more  WSDM 2012»
12 years 5 months ago
WebSets: extracting sets of entities from the web using unsupervised information extraction
We describe a open-domain information extraction method for extracting concept-instance pairs from an HTML corpus. Most earlier approaches to this problem rely on combining cluste...
Bhavana Bharat Dalvi, William W. Cohen, Jamie Call...
ICDM
2010
IEEE
170views Data Mining» more  ICDM 2010»
13 years 8 months ago
Targeting Television Audiences Using Demographic Similarity
Targeting advertising on television is difficult due to limitations around ad tracking and ad delivery. This paper describes a new method of television advertising which can work w...
Brendan Kitts, Liang Wei, Dyng Au, Stefanie Zlomek...
DSN
2008
IEEE
14 years 3 days ago
Experiences with formal specification of fault-tolerant file systems
Fault-tolerant, replicated file systems are a crucial component of today's data centers. Despite their huge complexity, these systems are typically specified only in brief pr...
Roxana Geambasu, Andrew Birrell, John MacCormick