Sciweavers

2705 search results - page 157 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ICDM
2005
IEEE
118views Data Mining» more  ICDM 2005»
14 years 4 months ago
A Heterogeneous Field Matching Method for Record Linkage
Record linkage is the process of determining that two records refer to the same entity. A key subprocess is evaluating how well the individual fields, or attributes, of the recor...
Steven Minton, Claude Nanjo, Craig A. Knoblock, Ma...
ICDM
2003
IEEE
181views Data Mining» more  ICDM 2003»
14 years 3 months ago
Dynamic Weighted Majority: A New Ensemble Method for Tracking Concept Drift
Algorithms for tracking concept drift are important for many applications. We present a general method based on the Weighted Majority algorithm for using any online learner for co...
Jeremy Z. Kolter, Marcus A. Maloof
DAWAK
2004
Springer
14 years 3 months ago
Categorical Data Visualization and Clustering Using Subjective Factors
Clustering is an important data mining problem. However, most earlier work on clustering focused on numeric attributes which have a natural ordering to their attribute values. Rec...
Chia-Hui Chang, Zhi-Kai Ding
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
14 years 2 months ago
Ranking - Methods for Flexible Evaluation and Efficient Comparison of Classification Performance
We present the notion of Ranking for evaluation of two-class classifiers. Ranking is based on using the ordering information contained in the output of a scoring model, rather tha...
Saharon Rosset
CSFW
2011
IEEE
12 years 10 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...